Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 67.574992][ T24] kauditd_printk_skb: 5 callbacks suppressed [ 67.575005][ T24] audit: type=1800 audit(1560017129.582:33): pid=9395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 67.617915][ T24] audit: type=1800 audit(1560017129.582:34): pid=9395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 71.826795][ T24] audit: type=1400 audit(1560017133.832:35): avc: denied { map } for pid=9571 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.233' (ECDSA) to the list of known hosts. 2019/06/08 18:05:40 fuzzer started [ 78.299146][ T24] audit: type=1400 audit(1560017140.302:36): avc: denied { map } for pid=9580 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/08 18:05:43 dialing manager at 10.128.0.26:46433 2019/06/08 18:05:43 syscalls: 2488 2019/06/08 18:05:43 code coverage: enabled 2019/06/08 18:05:43 comparison tracing: enabled 2019/06/08 18:05:43 extra coverage: extra coverage is not supported by the kernel 2019/06/08 18:05:43 setuid sandbox: enabled 2019/06/08 18:05:43 namespace sandbox: enabled 2019/06/08 18:05:43 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/08 18:05:43 fault injection: enabled 2019/06/08 18:05:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/08 18:05:43 net packet injection: enabled 2019/06/08 18:05:43 net device setup: enabled 18:07:57 executing program 0: [ 215.250055][ T24] audit: type=1400 audit(1560017277.252:37): avc: denied { map } for pid=9595 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16086 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 215.381427][ T9596] IPVS: ftp: loaded support on port[0] = 21 18:07:57 executing program 1: [ 215.525084][ T9596] chnl_net:caif_netlink_parms(): no params data found [ 215.572462][ T9596] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.582512][ T9596] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.591547][ T9596] device bridge_slave_0 entered promiscuous mode [ 215.605054][ T9596] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.612251][ T9596] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.635405][ T9596] device bridge_slave_1 entered promiscuous mode [ 215.652021][ T9599] IPVS: ftp: loaded support on port[0] = 21 18:07:57 executing program 2: [ 215.683713][ T9596] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.709429][ T9596] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.761873][ T9596] team0: Port device team_slave_0 added [ 215.782258][ T9596] team0: Port device team_slave_1 added [ 215.878119][ T9596] device hsr_slave_0 entered promiscuous mode 18:07:57 executing program 3: [ 215.984192][ T9596] device hsr_slave_1 entered promiscuous mode [ 216.045342][ T9601] IPVS: ftp: loaded support on port[0] = 21 [ 216.111256][ T9596] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.118584][ T9596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.126488][ T9596] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.133590][ T9596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.180617][ T9604] IPVS: ftp: loaded support on port[0] = 21 [ 216.212534][ T9599] chnl_net:caif_netlink_parms(): no params data found 18:07:58 executing program 4: [ 216.379513][ T9599] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.403925][ T9599] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.412209][ T9599] device bridge_slave_0 entered promiscuous mode [ 216.439998][ T9599] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.455812][ T9599] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.467663][ T9599] device bridge_slave_1 entered promiscuous mode [ 216.490264][ T9599] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 216.518932][ T9596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.531544][ T9599] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 216.573158][ T9596] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.590103][ T9606] IPVS: ftp: loaded support on port[0] = 21 [ 216.608797][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 18:07:58 executing program 5: [ 216.631246][ T2999] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.650385][ T2999] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.660905][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 216.698851][ T9599] team0: Port device team_slave_0 added [ 216.708030][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.718939][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.727984][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.735207][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.772653][ T9599] team0: Port device team_slave_1 added [ 216.779723][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.788913][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.798385][ T3647] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.805501][ T3647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.813471][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.822671][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.838277][ T9601] chnl_net:caif_netlink_parms(): no params data found [ 216.900301][ T9613] IPVS: ftp: loaded support on port[0] = 21 [ 216.904238][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.916576][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.925256][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.934745][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.943138][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.952224][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.960815][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.016923][ T9599] device hsr_slave_0 entered promiscuous mode [ 217.074540][ T9599] device hsr_slave_1 entered promiscuous mode [ 217.142879][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.151482][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.167857][ T9596] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.180961][ T9604] chnl_net:caif_netlink_parms(): no params data found [ 217.199911][ T9601] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.208267][ T9601] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.216258][ T9601] device bridge_slave_0 entered promiscuous mode [ 217.247419][ T9601] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.255324][ T9601] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.263065][ T9601] device bridge_slave_1 entered promiscuous mode [ 217.316560][ T9601] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.331752][ T9604] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.339450][ T9604] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.347638][ T9604] device bridge_slave_0 entered promiscuous mode [ 217.358365][ T9604] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.365723][ T9604] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.373912][ T9604] device bridge_slave_1 entered promiscuous mode [ 217.391725][ T9601] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.427736][ T9604] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.440161][ T9604] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.481200][ T9601] team0: Port device team_slave_0 added [ 217.489135][ T9601] team0: Port device team_slave_1 added [ 217.555832][ T9601] device hsr_slave_0 entered promiscuous mode [ 217.594659][ T9601] device hsr_slave_1 entered promiscuous mode [ 217.666539][ T9606] chnl_net:caif_netlink_parms(): no params data found [ 217.692214][ T9596] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.741365][ T9604] team0: Port device team_slave_0 added [ 217.801176][ T9613] chnl_net:caif_netlink_parms(): no params data found [ 217.812018][ T9604] team0: Port device team_slave_1 added [ 217.897040][ T9604] device hsr_slave_0 entered promiscuous mode [ 217.934307][ T9604] device hsr_slave_1 entered promiscuous mode [ 218.016552][ T24] audit: type=1400 audit(1560017280.022:38): avc: denied { associate } for pid=9596 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 18:08:00 executing program 0: [ 218.160697][ T9613] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.169234][ T9613] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.179096][ T9613] device bridge_slave_0 entered promiscuous mode 18:08:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, 0x0) [ 218.209363][ T9606] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.223990][ T9606] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.231735][ T9606] device bridge_slave_0 entered promiscuous mode [ 218.246900][ T9606] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.255506][ T9606] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.264529][ T9606] device bridge_slave_1 entered promiscuous mode [ 218.290954][ T9613] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.310729][ T9613] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.321104][ T9613] device bridge_slave_1 entered promiscuous mode [ 218.359621][ T9606] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.387134][ T9606] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.433227][ T9599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.451048][ T9613] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.466407][ T9613] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.477304][ T9606] team0: Port device team_slave_0 added 18:08:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) r0 = epoll_create1(0x0) fcntl$getown(r0, 0x9) [ 218.500939][ T9606] team0: Port device team_slave_1 added [ 218.550649][ T24] audit: type=1326 audit(1560017280.552:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9630 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c0ba code=0x0 [ 218.562899][ T9613] team0: Port device team_slave_0 added [ 218.584346][ T9604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.601925][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.611564][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.624405][ T9601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.635478][ T9613] team0: Port device team_slave_1 added [ 218.652277][ T9599] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.709222][ T9606] device hsr_slave_0 entered promiscuous mode [ 218.744450][ T9606] device hsr_slave_1 entered promiscuous mode [ 218.791124][ T9601] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.819564][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.828884][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.838435][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.847509][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.856289][ T9611] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.863372][ T9611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.871636][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.880448][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.889642][ T9611] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.896728][ T9611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.904462][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.913335][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.967823][ T9613] device hsr_slave_0 entered promiscuous mode [ 219.014096][ T9613] device hsr_slave_1 entered promiscuous mode [ 219.061201][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.070164][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.079151][ T9611] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.086315][ T9611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.098996][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.107786][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.116329][ T9611] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.123381][ T9611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.131090][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.139781][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.147661][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.155581][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.169291][ T9604] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.187064][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.198920][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.207963][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.217108][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.225905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.234728][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.243068][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.250271][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.287348][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.295927][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.304176][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.312743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.322427][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.331569][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.340765][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.349981][ T24] audit: type=1326 audit(1560017281.352:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9630 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c0ba code=0x0 [ 219.350803][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 18:08:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, 0x0}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 219.383022][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.391899][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.401093][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.408234][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.418906][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.449531][ T9599] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.474918][ T9599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.508619][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.524877][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.534469][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.543228][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.552483][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.561201][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.570671][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.579805][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.589640][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 18:08:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) [ 219.620716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.634908][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.643530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.652693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.703705][ T9604] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.728921][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.744260][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.752696][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.768906][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.779984][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.793569][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.810046][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.835224][ T9599] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.900256][ T9606] 8021q: adding VLAN 0 to HW filter on device bond0 18:08:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x3) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/relabel\x00', 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @loopback, 0x20}, 0x1c) dup2(0xffffffffffffffff, r2) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xfff8, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000600)={&(0x7f0000000480)=@getaddr={0x14, 0x16, 0x300, 0x70bd2c}, 0x14}}, 0x20000040) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) [ 219.962431][ T9601] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.978375][ T9604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.001909][ T9606] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.054430][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.062465][ T9611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.128756][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.158444][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 18:08:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x480) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000002700)) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x3) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfff8, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) sendmsg$nl_route(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000480)=@getaddr={0x14, 0x16, 0x300, 0x70bd2c, 0x25dfdbfc}, 0x14}}, 0x20000040) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) [ 220.179192][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.186371][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.231011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.252436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.261669][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.268802][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.276866][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.295664][ T9613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.317595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.342034][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.353506][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.365582][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:08:02 executing program 2: [ 220.429194][ T9613] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.439021][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.448434][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.465830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 18:08:02 executing program 3: [ 220.484509][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.521183][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 18:08:02 executing program 2: [ 220.533730][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.560317][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.597858][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.613085][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.638100][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.667803][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.677203][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.686735][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.693855][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.701744][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.710908][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.724741][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.731843][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.740291][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.754239][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.788007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.799681][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.810739][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.820060][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.829142][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.838520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.852639][ T9606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.868401][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.878670][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.898950][ T9613] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 220.931449][ T9613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.946345][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.960891][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.992855][ T9613] 8021q: adding VLAN 0 to HW filter on device batadv0 18:08:03 executing program 4: 18:08:03 executing program 3: 18:08:03 executing program 2: 18:08:03 executing program 0: 18:08:03 executing program 1: 18:08:03 executing program 5: 18:08:03 executing program 5: 18:08:03 executing program 1: 18:08:03 executing program 2: 18:08:03 executing program 3: 18:08:03 executing program 0: 18:08:03 executing program 4: 18:08:03 executing program 5: 18:08:03 executing program 1: 18:08:03 executing program 2: 18:08:03 executing program 3: 18:08:03 executing program 4: 18:08:03 executing program 0: 18:08:03 executing program 5: 18:08:03 executing program 1: 18:08:03 executing program 2: 18:08:03 executing program 4: 18:08:03 executing program 0: 18:08:03 executing program 1: 18:08:03 executing program 5: 18:08:03 executing program 3: 18:08:04 executing program 4: 18:08:04 executing program 1: 18:08:04 executing program 0: 18:08:04 executing program 2: 18:08:04 executing program 5: 18:08:04 executing program 3: 18:08:04 executing program 2: 18:08:04 executing program 1: 18:08:04 executing program 4: 18:08:04 executing program 0: 18:08:04 executing program 3: 18:08:04 executing program 1: 18:08:04 executing program 4: 18:08:04 executing program 5: 18:08:04 executing program 3: socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) unshare(0x40000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) getegid() keyctl$chown(0x4, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x3, 0x0) 18:08:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000006c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0485510, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) 18:08:04 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) unshare(0x40000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) getegid() keyctl$chown(0x4, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x3, 0x0) 18:08:04 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) fchmod(0xffffffffffffffff, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) unshare(0x40000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) getegid() openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x3, 0x0) 18:08:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'team_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave_0\x00', 0x200008000005}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:08:04 executing program 4: [ 222.798199][ C1] hrtimer: interrupt took 49613 ns 18:08:04 executing program 2: 18:08:05 executing program 2: [ 223.018833][ T9768] IPVS: ftp: loaded support on port[0] = 21 18:08:05 executing program 4: 18:08:05 executing program 2: 18:08:05 executing program 4: 18:08:05 executing program 2: [ 223.478630][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.678889][ T9785] IPVS: ftp: loaded support on port[0] = 21 [ 223.741831][ T9776] IPVS: ftp: loaded support on port[0] = 21 [ 223.859102][ T9785] IPVS: ftp: loaded support on port[0] = 21 18:08:05 executing program 3: 18:08:05 executing program 4: 18:08:05 executing program 2: 18:08:06 executing program 5: 18:08:06 executing program 1: 18:08:06 executing program 0: 18:08:06 executing program 4: 18:08:06 executing program 3: 18:08:06 executing program 2: 18:08:06 executing program 5: 18:08:06 executing program 0: 18:08:06 executing program 1: 18:08:06 executing program 3: 18:08:06 executing program 0: 18:08:06 executing program 4: 18:08:06 executing program 5: 18:08:06 executing program 2: 18:08:06 executing program 1: 18:08:06 executing program 5: 18:08:06 executing program 0: 18:08:06 executing program 4: 18:08:06 executing program 3: 18:08:06 executing program 2: 18:08:06 executing program 0: 18:08:06 executing program 1: 18:08:06 executing program 4: r0 = socket(0x2, 0x80002, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") recvmsg(r0, &(0x7f000000b600)={0x0, 0x0, 0x0}, 0x40002000) 18:08:06 executing program 3: 18:08:06 executing program 5: [ 224.840141][ T9858] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:08:06 executing program 0: 18:08:06 executing program 1: 18:08:06 executing program 3: symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc396}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(0x0, &(0x7f0000000680)=[0x0, &(0x7f0000000540)='\x00', 0x0, 0x0], 0x0) unlink(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') clone(0x80000000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc00000000000000000", 0x4a}], 0x1}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x80, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000480)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendto(r1, &(0x7f00000009c0)="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", 0x1000, 0x4000004, 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r2, 0x400, 0x70bd26, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x3) rmdir(&(0x7f0000000000)='./file0\x00') setxattr$security_smack_entry(&(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f00000004c0)='y\x00', 0x2, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 18:08:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x7, 0xffff, 0x9, 0x3f}, {0x2, 0x80000000, 0x9, 0x4}, {0xffffffff7fffffff, 0x0, 0x7f, 0xfffffffffffffffd}]}, 0x10) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x6800, 0x0, 0x0, 0x0) 18:08:07 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f00000003c0)='./file0\x00', 0x1, 0x0, &(0x7f0000000300), 0x4000, &(0x7f0000000380)='%)eth1md5sum#lo{em0,eth0*]eth1$vboxnet0\x00') ioctl$CAPI_GET_PROFILE(r0, 0x80044326, &(0x7f0000000080)=0x3) 18:08:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000180)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x0, 0x1}, {0x80}, 0x0, 0x3}) prctl$PR_SET_FPEMU(0xa, 0x0) 18:08:07 executing program 1: prctl$PR_MCE_KILL(0x21, 0x0, 0x2) init_module(&(0x7f0000000000)='mime_type[\'[\x00', 0xd, &(0x7f0000000040)='ppp1)[!lo.userem0\x00') [ 225.150697][ T9875] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 18:08:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x4fad9f2358b1fe4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) [ 225.200660][ T24] audit: type=1400 audit(1560017287.202:41): avc: denied { create } for pid=9872 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 18:08:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000005c0)='./file1\x00', 0xf151, 0x0, 0x0, 0x0, &(0x7f0000001940)=ANY=[@ANYBLOB="6c6f000000000000000600"]) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x7ff) 18:08:07 executing program 0: mremap(&(0x7f0000182000/0x3000)=nil, 0x7ffffffff000, 0x7ffffffff000, 0x0, &(0x7f00000be000/0x2000)=nil) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x101, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x3f, &(0x7f0000000040)=0x6, 0x4) mremap(&(0x7f00000bd000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f00000bd000/0x1000)=nil) 18:08:07 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) ioctl(r0, 0x1ff, &(0x7f00000000c0)="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") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet6_buf(r2, 0x29, 0xb, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 18:08:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname$inet(r0, 0x0, 0xffffffffffffffff) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000080)={0x0, 0x6}) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000040)=[r0, r0, r0, r0, r0, r0], 0x6) 18:08:07 executing program 3: r0 = fsopen(&(0x7f0000000200)='hugetlbfs\x00', 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4e1d, 0x161b40) r2 = getpid() fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) set_tid_address(&(0x7f0000000140)) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000100)={r1, r0, 0x100000001}) fsconfig$FSCONFIG_SET_PATH(r0, 0x2, &(0x7f0000000080)='ul\xfd\xf8j\xf7\xfdZ\xec\xe8\xf4\x1f\xd8mJ\xe0(\x81\xa30x0) fcntl$setown(r1, 0x8, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:08:08 executing program 4: socket$kcm(0x10, 0x5, 0x10) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x1000, 0x4, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x24}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x291, &(0x7f00000000c0), 0x1}, 0x0) [ 226.381687][ T24] audit: type=1804 audit(1560017288.232:44): pid=9943 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir780100818/syzkaller.BB5Mxz/18/file0" dev="sda1" ino=16572 res=1 18:08:08 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x246) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000002000000fb810e395394a0459b365f8cb3cedcf0459495ce5a1ee8216e4013f55908a1c4b85e1d7b46c0c12431b5e8b8045940e6cfbfe2e0d8053d78e5a2e51c08a0396ccaf8f2778d27269703"], 0x2) 18:08:08 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x8000, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x16, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_delete(r1) r2 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)=@secondary='builtin_and_secondary_trusted\x00') r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='projid_map\x00') syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) signalfd(r3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x8) setsockopt$inet6_tcp_int(r3, 0x6, 0x8, &(0x7f0000000100)=0x9, 0x4) keyctl$unlink(0x16, r2, r2) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r5, 0x10, 0x70bd25, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000) r6 = msgget(0x2, 0x48) msgsnd(r6, &(0x7f0000000500)={0x3, "d0cf68437fa585c584eb250d945d85c256b4aac1058ef14f9d331d5fa538f03ffcacf94b1d81dcbc57837a82b434b61bb5e7f8f4626b0eb8080ae11ac735f19bc61ed9514fd2e89d56fcff7beaa421c75c7f2dc68b732fe0d91e2b1fca869143cf6e10757bbd78f9ce92c013b9c344b0dbdbe3f6c56455c693a6d09e1ce2b5d992131e12eb9dc50a97c2decd8ad5311c40d9c9225e51b6e5a122f553ee6759054127eb9db57e8473a7647aba3bbfa4ff6a3449530a9e6d51292d527e49de1a"}, 0xc7, 0x800) r7 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x101440) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) [ 226.644070][ T24] audit: type=1400 audit(1560017288.262:45): avc: denied { prog_load } for pid=9945 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 18:08:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) socket(0x1a, 0x2, 0xffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r1, 0x1, 0x24, 0x0, &(0x7f0000000040)) fcntl$addseals(r0, 0x409, 0x9) bind$alg(r0, &(0x7f00000003c0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x100000000, 0x800) openat$cgroup_ro(r2, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f00000000c0)={0xa00000000000000, 0x0, 0x1, 0x5, 0x13}) [ 226.859331][ T24] audit: type=1400 audit(1560017288.532:46): avc: denied { create } for pid=9960 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:08:09 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80040, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000280)={@dev={0xac, 0x14, 0x14, 0x11}, @loopback, r2}, 0xc) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000600)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000240)="dc7cd7888b", 0x0}, 0x20) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 18:08:09 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x1) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="5500000018007f1dfd0000b2a4a280930a80000000a84308910000000e0008000a000c00060000001940a30700000000000000001338d52f4400009bfb83de448daa7227c43ac9220000010cec4fab91d400000000", 0x55}], 0x1}, 0x0) 18:08:09 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x10000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000000c0)=0x63, 0x2) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x800000000) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20100, 0x0) [ 227.063944][ T24] audit: type=1400 audit(1560017288.752:47): avc: denied { write } for pid=9966 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 227.328959][ T24] audit: type=1400 audit(1560017288.752:48): avc: denied { read } for pid=9966 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 227.371935][T10003] device nr0 entered promiscuous mode 18:08:09 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000140)='.dead\x00', &(0x7f0000000180)='\x00') r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 18:08:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x7) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0x0, "daf2c82ef0a4a7fc37bd440c2ea6593f9e24d66405bb48bcfa18288ee8607032d55e3c40da1ab81fef5b37f7d17e608c345d496f6975ffe9d2166bb2e38910798fc7454ae92070dbaa7e5e92da221017"}, 0xd8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x40004e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, 0x0) r2 = socket$inet6(0xa, 0x3, 0xb) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x11c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$bt_sco(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2de) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000300)={0x1, 0x8001}, 0x8) close(r0) 18:08:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="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", 0xfc) r1 = semget$private(0x0, 0x3, 0x1) semop(r1, &(0x7f0000000000)=[{0x1, 0x100}, {0x2, 0x400, 0x1800}, {0x2, 0x7, 0x800}, {0x1, 0x101, 0x800}, {0x3, 0x3, 0x1000}, {0x4, 0x1b6d, 0x1800}, {0x5, 0x7ff, 0x1800}, {0x1, 0x8, 0x1000}, {0x5, 0x1, 0x1000}], 0x9) 18:08:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$netrom(r1, &(0x7f0000000100)={{0x3, @null, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x0, 0x46, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x2, 0x0, &(0x7f0000000300)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r1, @ANYRES32=r1]}, 0xbe) ioctl$KDSKBLED(r1, 0x4b65, 0x3) 18:08:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x43, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8fffa) sendfile(r3, r3, 0x0, 0x8800000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', r2}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000340)="030400000300600000000000fff55b4202938207d9fb3780398d537500e50600591f301ee616d5c0184374a7ffe4ec55e0650053c0e385472da70100935ba514d40000efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000000d1843e770afd6e9ef5837dbd", 0x6c, 0x0, 0x0, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x86040, 0x0) connect$unix(r5, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e) [ 227.943446][ T24] audit: type=1800 audit(1560017289.942:49): pid=10020 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16572 res=0 [ 227.993920][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 227.999960][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 228.077260][T10026] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.5'. [ 228.103922][ T24] audit: type=1800 audit(1560017290.082:50): pid=10031 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16590 res=0 18:08:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x11, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x4, 0x400000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f00000000c0)={0x0, {0x4, 0x100000000}}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000200)={{0x0, @multicast1, 0x4e20, 0x0, 'wlc\x00', 0x14, 0x6, 0x10}, {@empty, 0x2, 0x10000, 0x10000}}, 0x44) socket$inet(0x2, 0x2, 0x0) delete_module(&(0x7f00000002c0)='wlc\x00', 0x800) r3 = socket$packet(0x11, 0x6, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10) dup2(r2, r0) [ 228.201934][T10003] device nr0 entered promiscuous mode [ 228.233885][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 228.239766][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 228.321811][T10030] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.5'. 18:08:10 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x43, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8fffa) sendfile(r3, r3, 0x0, 0x8800000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', r2}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000340)="030400000300600000000000fff55b4202938207d9fb3780398d537500e50600591f301ee616d5c0184374a7ffe4ec55e0650053c0e385472da70100935ba514d40000efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000000d1843e770afd6e9ef5837dbd", 0x6c, 0x0, 0x0, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x86040, 0x0) connect$unix(r5, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e) [ 228.426502][T10049] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:20000 [ 228.477609][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 228.483584][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:08:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="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", 0xfc) r1 = semget$private(0x0, 0x3, 0x1) semop(r1, &(0x7f0000000000)=[{0x1, 0x100}, {0x2, 0x400, 0x1800}, {0x2, 0x7, 0x800}, {0x1, 0x101, 0x800}, {0x3, 0x3, 0x1000}, {0x4, 0x1b6d, 0x1800}, {0x5, 0x7ff, 0x1800}, {0x1, 0x8, 0x1000}, {0x5, 0x1, 0x1000}], 0x9) 18:08:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="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", 0xfc) r1 = semget$private(0x0, 0x3, 0x1) semop(r1, &(0x7f0000000000)=[{0x1, 0x100}, {0x2, 0x400, 0x1800}, {0x2, 0x7, 0x800}, {0x1, 0x101, 0x800}, {0x3, 0x3, 0x1000}, {0x4, 0x1b6d, 0x1800}, {0x5, 0x7ff, 0x1800}, {0x1, 0x8, 0x1000}, {0x5, 0x1, 0x1000}], 0x9) [ 228.742134][T10056] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.5'. [ 228.954289][T10061] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. [ 229.176449][T10052] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:20000 18:08:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000080)) flock(r0, 0xfffffffffffffffc) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r2, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159, 0x9f}], 0x1, 0x0) 18:08:11 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="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", 0xfc) r1 = semget$private(0x0, 0x3, 0x1) semop(r1, &(0x7f0000000000)=[{0x1, 0x100}, {0x2, 0x400, 0x1800}, {0x2, 0x7, 0x800}, {0x1, 0x101, 0x800}, {0x3, 0x3, 0x1000}, {0x4, 0x1b6d, 0x1800}, {0x5, 0x7ff, 0x1800}, {0x1, 0x8, 0x1000}, {0x5, 0x1, 0x1000}], 0x9) 18:08:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x7) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0x0, "daf2c82ef0a4a7fc37bd440c2ea6593f9e24d66405bb48bcfa18288ee8607032d55e3c40da1ab81fef5b37f7d17e608c345d496f6975ffe9d2166bb2e38910798fc7454ae92070dbaa7e5e92da221017"}, 0xd8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x40004e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, 0x0) r2 = socket$inet6(0xa, 0x3, 0xb) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x11c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$bt_sco(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2de) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000300)={0x1, 0x8001}, 0x8) close(r0) [ 229.481994][T10075] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.3'. 18:08:11 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000140)='.dead\x00', &(0x7f0000000180)='\x00') r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 18:08:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="fc0000004a000700ab072500090007000aab80ff01bce43b7800369321000100ff010000000500000000000000036915fa2c1ec28656e4070000000000006c79ae0bae52ade9c4b7f07c9659ec2fe3f8f68618d9a79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e29bca0c0117c22ebc205214000000000008934d07302ade01f20d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f32e280aed27e71deb8c53931b78652bf19fc83ab82f605f70c9dded2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94c0ad91bd0734babc7c3f2eeb57d43dd16b17e583cb150c3b880f411f46a6b567abf5bd611ec51070e0", 0xfc) r1 = semget$private(0x0, 0x3, 0x1) semop(r1, &(0x7f0000000000)=[{0x1, 0x100}, {0x2, 0x400, 0x1800}, {0x2, 0x7, 0x800}, {0x1, 0x101, 0x800}, {0x3, 0x3, 0x1000}, {0x4, 0x1b6d, 0x1800}, {0x5, 0x7ff, 0x1800}, {0x1, 0x8, 0x1000}, {0x5, 0x1, 0x1000}], 0x9) 18:08:11 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000140)='cpuset-cgroup&\x00', &(0x7f0000000180)='cpuset-cgroup&\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") syz_open_procfs(0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) init_module(&(0x7f0000000000)='cpuset-cgroup&\x00', 0xf, &(0x7f0000000080)='vmnet0lo]R*nodevsystemmd5sum+vboxnet1\x00') ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000340)=0x2) 18:08:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="2312930dfb703341d2bea2380dd13281c1108cfd9657feecfca80f2ca421dacec4df2ebdefb3a70c08ea0f515e13beae0f84c64aab9b62e37bb6286a20fe33e8c4158c1591fdf7d424e61af38ebcbfa3d82b96", 0x53, 0xfffffffffffffff9) r2 = add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000600)="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", 0x1000, 0xfffffffffffffffc) epoll_create(0x1f) keyctl$reject(0x13, r1, 0x2, 0x7b, r2) ioctl(r0, 0x1000008912, &(0x7f0000000300)="ffdca500080000ecd19d68bebe423888a7de78b1f53567f77be0cd") r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) socket(0xa, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RXATTRCREATE(r4, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) ioctl$SG_EMULATED_HOST(r5, 0x2203, &(0x7f0000000140)) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f00000005c0), 0x4) r6 = gettid() getpriority(0x1, r6) 18:08:11 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000180)={0x0, 0x7, 0x2021}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000080)={0x40000000, 0x0, "81c503ba5e7162705cee9d9552e28e68ac8130fd589504a84412b187e57dd81f"}) 18:08:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000080)) flock(r0, 0xfffffffffffffffc) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r2, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159, 0x9f}], 0x1, 0x0) [ 229.725231][T10082] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.5'. 18:08:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000080)=0x100000001) fcntl$setflags(r0, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200200) [ 229.775012][T10087] EXT4-fs warning (device sda1): ext4_group_extend:1768: can't shrink FS - resize aborted 18:08:11 executing program 0: syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000002700)={@rand_addr, @dev, 0x0}, &(0x7f0000002740)=0xc) sendmmsg$sock(r0, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)="9235235101a42c1e0e603e08af01d87b703e6cec3265cfbbbdfeb0", 0x1b}, {&(0x7f0000000100)="6dffd80048eedd66e161cc4124c27bcdc7ad02a9eca2308598b701abd94e165aaa6433497a44116f48c4b3519495436c883b2b25772ba13b660501449a5a2f16e30b296a3000edfc78c4c4a66c5c5df417cf9bd678234a325c94733be0342ea4ed4161dfcf0aec195f1b", 0x6a}, {&(0x7f0000000180)="90c2a66a96b34ceb6179f109c4e1e753c5e8e2ff54b39e07cfd4", 0x1a}], 0x3}}, {{&(0x7f0000000340)=@xdp={0x2c, 0x0, r1, 0x2e}, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)="23fd4f08b44e742ba5b50dd4ca23e0f00385514dcb7b964fbbab09bc79fec676e8d2c8adafcadaf10071b0a0e76d38b0936fb398373b0f091df5419dad2a6fe019514cf89371d1b4f64c6d8f8f55526e0e1be7d23380fa54b2966d1906010566cbeabf5c4f3062bd", 0x68}, {&(0x7f0000000440)="125f575d97012a04d616c8df7a849c4039ac94611d8cb83733dd0a70", 0x1c}], 0x2, &(0x7f00000004c0)=[@txtime={{0x18, 0x1, 0x3d, 0x80000001}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x1ff}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0x90}}, {{&(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @loopback}, 0x1, 0x3, 0x2}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000600)="97d3b820fd8b3b0198eb4ac192bcc0a78b3b0b8fb9cca1793594f05c80e2f24dc882bbb664695421bc4d09c752ee3e4632c3d07703378b83e85cc7d782b01978c08482038510bc5f0d9846de0ee08910a6f81b862791bd92f9eada089deecec5fba39431f7258d1b8230d77246797397b1fc6ef392e2916723ea8de90c3a18aa717fc5dcac656bbf00ef6bc7c0e08192b7960949dc02740d05514efe75c3f0d58e10c1c17b088d6a065a2870b1647998ab64", 0xb2}, {&(0x7f00000006c0)="1b5f53bfa74b6d562f0b15bf9f36bdde093f95dfd8a0b91f0ddaa9a2", 0x1c}, {&(0x7f0000000700)="a0e3c1217d1d8c183175ef2f624e987767d270b0cd9e88c19850572beac3a6b43145aebf7ef3b8dcf8766a05db39e2c2de226097bf7f41fb0327d81f189dd5fdba58ba52e5a314b5f192aabd204fffb1fb162a96900430c6d5a42d24a95cf5f6979897f90ffdafe8965dda58a64e74ae9294fa32ee7f0f14c2e4290b82856669574bf89e5f614be5e5ddb4bbd7705f0ddf6d30abb12d2507", 0x98}, {&(0x7f00000007c0)="95c388047caf7b61299b09f6cd1257bcbf1f73b037e7094bb56473f242388165be5f7f5490008d566f44513c374356303c3ec1538347a3795cdfcefefec850b5f1473fb1a82fb4b820d9baf25fabc06e968ded01fa418cfb79a40ca0dede28e402622c2ec51330774db1c6aad43a1a628d401017d499a6498d0c3c7adb499332a50b7f61f7cfc56971dad1749f8978cadbc82bfd534892623b77b62696e66909eb2c38d9e3537229bdc73a3262a447fa1b30b28e79697267d806fd8c9bc6bb13988957920fa6de1c1b1ca8b1ddec7bf638c9b2b4ec8ffc6c257ea27ce1422cf04f87189802ccbdcb3d47c40b0b4ba6", 0xef}, {&(0x7f00000008c0)="3ba564f4934d918aaa23dda2a5853ff7e2ff19da81e76540a18aa5eae4bab8177e3f68e5039d1d77a4d149bb509eef82efeab46e738d34112c4b75f252f92643e183d9a0bcec63078b304a17cd67d63559487b1505357346bad69ced9716b094db70a9cebcd03b51b12d38d91f571f93fce194dcd3f31f6332f6ad19f7d256812709db2a7eef783c1c8e6ab4bbac19244959f4d70db44fde5a3bf09f3969c1b6cc40dcff5c2f70cc02422503031175401542196ea8e521e3c3247dc6f27ec88a62f5b7ed9207089568f4526f7ef19d1afe4a2e5d2b93e4f69216bd10b6eb76", 0xdf}], 0x5, &(0x7f0000000a40)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xffffffff7fffffff}}], 0x60}}, {{&(0x7f0000000ac0)=@nl=@kern={0x10, 0x0, 0x0, 0x1200050}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000b40)="3860bcafe532349e5f14704d62a68ff793fb300417786a70685f49170963140d75d6007cfcac1b268d68a695a8453df79e7d4868a57bb421400d591b5d7baba94ada24995b4bc552701528cc883e46946728e845b0e6a16cc2c809dc2dd93899571f242fe66b44487e3f9095de76924333c89d2888589355742f2e7eb532d5d6b80a6881ed34ca7953d2c1e4f8eadb77cca198516a931edd590440542ab00067757091b87d092abf62eee5719a9f63410f83a669", 0xb4}, {&(0x7f0000000c00)="84a202a5aaf4e1f4b92808e765e0b8cf3f3c2f6cd10c31ad32d3e4d5a7b89f21706e5f51435bf6f647199dbf4b88", 0x2e}, {&(0x7f0000000c40)="44f3c3f81f700df9c3af78937933a13fcd66de61985e04624d2ee94ee91dc5efeb63572d40f562ed2ea2d22388eb", 0x2e}, {&(0x7f0000000c80)="25d083e5ecfd21063ad94c1f34201b4e55db4050d315c8f904d36da27a4f9708cf9597e52f5dd6f96a3b13a6ed3fc02d8bb3f0dd3cb7500d3f6d", 0x3a}, {&(0x7f0000000cc0)="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", 0x1000}, {&(0x7f0000001cc0)="89037c60fa0466ea0f808ef1754f987660", 0x11}], 0x6, &(0x7f0000001d80)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x959f}}, @txtime={{0x18, 0x1, 0x3d, 0x100}}], 0x78}}, {{&(0x7f0000001e00)=@generic={0x1, "2988f13005aa74898e88d2ad6f43f3a816775a3443e94e1e851edbfa8fcc8ef1b763b65dad54d6eb45f38a83e8630b223bda88ab6964db00f7ee5df121b99a0de45f8615d814f8abb69252e2978c62d9917776e01568e7487dbf7c47cd39ad8dbd7fd4db728d81e5cacdc562fcd6fd549a214e4ddb941c0cc6b85042e749"}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001e80)="0599aa4d5e25bad82c139395b22954aad9d261d14f02df3413c028987a6e9db2467cf3855080368ed90b3ce01abc710d", 0x30}, {&(0x7f0000001ec0)="d5e8459d61dedd64600e936e7e68d60d706e60d125ee8f19ac0cdcd9869d0d25123b85aaf1a70023511e88782dfee9358c9f2b758b8b817b828c08a17ab822870a0718133f6a3db6bb13f302cae2f8e7fbaf726f1eeb300fa69d10bc402de147e6deef9df5fa275b1e54edf68e3d03546a6382359f3985c59100a21d40a240562f713c822ef816293fab2cc67bb22abf2b4fae87fa5a706b5caa", 0x9a}], 0x2, &(0x7f0000001fc0)=[@timestamping={{0x14, 0x1, 0x25, 0x7fffffff}}, @timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x40}}, @txtime={{0x18, 0x1, 0x3d, 0x7fff}}, @txtime={{0x18, 0x1, 0x3d, 0x20}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x7f}}, @mark={{0x14, 0x1, 0x24, 0x3ff}}], 0xc0}}, {{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000002080)="531b214077bdd40a65538298c95c14f1832180538c3988b6c1858652da413100f083ea05761f9c198da5b2b5b08e754998c5499a9514015fdd40f58b2aae2f607d4e8894f8b93b57cecdd1fb6d2a4e1c980844972c5774aa99883e4c13765d70d505a1bc180dac6041c1814c1153d461c0b882589b47cdcf22b7db03c88f077df71acee403513ec538b9137d588a57af99bfbd8ddc4c4cc9", 0x98}, {&(0x7f0000002140)="ec9cabb7ca4d6795ac1216a4972a144de70cecbc8f2012363ff76a0b1b85ccc28c33ca8b22315636208e474fda6f85ecbc103d8532ef509e10e3e31c7045a5335654194a150945f5dd818e5af88ede658db3e952062295c305f1ea2140fc5783ebb8668702927236e509dad2827653b31c5e3126731e68f436382273665c48eb0efba3ee", 0x84}, {&(0x7f0000002200)="37e83bd4b647330852bfff67feb1d4ccf678865be969dff0a188b304289697e5a1deb6a1dbb9b020283fe675335c9182e733e256dff530fae064912054a2c672daa6697c5953dfac4867e58ee5fa231b819441698de3ee1bccbe2c2c0f466eef571d2e84", 0x64}, {&(0x7f0000002280)="00944064d72275fb60f0dc5471b210eb26482c296466303537cce3a018d1f6bba61ea83eba3330f74b50cb38b1411a22", 0x30}, {&(0x7f00000022c0)="6999f45e0ad934bd4aff821e5bf00a794846bd8ded144e1d1b3eb9bff95ab6fc62ad4e41731d32e6f7c2d2ba6640cd8e75a80740a347494948e4109098c7632a1eb48c6f47c5d619356227a36ff56dac2b64934e7e459cf51158895a7dd1c31e78082f460c85d74ec420956b2a6fa95c429952ff3d5c96a7bd15869a1df42e4a5aa2d337c785e7f554d4cdbd04689de5d4db0fef6319127bb94aba3d4b13e44c80fa0e8778b3c25ef0b6604549b292aac1a511d8c447c566dff1321ad965ff22a8168ed67d0d20f8b4", 0xc9}], 0x5, &(0x7f0000002440)=[@timestamping={{0x14, 0x1, 0x25, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x3f}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0x4aac16fd}}], 0xf0}}, {{&(0x7f0000002540)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x1, 0x1, {0xa, 0x4e23, 0x0, @rand_addr="3a2d7354a839f35b60ed7c3aa4e5ae70", 0x80000000}}}, 0x80, &(0x7f00000026c0)=[{&(0x7f00000025c0)="ac703282a076b686c4a4b4662b3c6033f8df6a8dd45cfd3b1e97aa96bb31e190da115ec6fd768caf5c44323a1835180d14788281e133aca9f5cc8a8bd8e07514ca148754554c5cdea26199fe1c568ccd3090fe30427ea76e2cef6de9fb81641cbd8d35c18d4db0307a3cfb2f003a963966232c25ff8aa7c862a37485a753", 0x7e}, {&(0x7f0000002640)="0b2928858174380d8cad97408e0dea948bd365733422f1ca22acb7d63e7585f97abe21b3d6ab1a4770132039759368a117c760d7c004954e24b82d48d266c8009ea7622fd42c8469a56eaa60549282ffa66b7758ab2bc5bf1597984cc4216aef19c0", 0x62}], 0x2}}, {{&(0x7f0000002780)=@ll={0x11, 0xf6, r2, 0x1, 0x7f7, 0x6, @remote}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002800)="3a4fcd065fd99d7babcae7344473d9f3d2816af61f2d539566f081ab3eaf3bc9918d7d049cf61bdeec3ba67dcc53a38e7c82fd45a8a5dcdcaca095bf1bf0baa3a4c03b071883c082337fbadfaa5de7fe8f0f75dfe74a01531da94baded7ab2c7bcae1c17d0472c37920327a0af6dd6d3a2ed16c030575a51777fa25dde8fe88a69d97b215b4ccaa80ffd6090649b279f29518b484a35a86f1fe66e42a9697de50ba88c9fbbceac0d68e259e884de8e3679ff2aa8ae42", 0xb6}, {&(0x7f00000028c0)="09ee4fda135c45b0e226558150a17024afd14ad391212f5bdd9139fe2d25332a66ece3cb894409802edc8da247ab3b768f79f3eb230defc54e60e86eba406b2ab1064f779403a762dc111e25e343f3e4cb5604c050dab88740669cac3610914eb41aabe9ec2fd24541db6ee8983a2ba4eda9de933fe1e6d8c3d108d775e14748276919d2748c97e9dc7079804d8b8b4cc37bd96c9d6dbf712800b9b489b54223aa3640a44f114d29cc70a8d7c6b48f277aa687cb85254882ee90adf2e1a5f3350890d7fcf4a010ecd70523d5a9d9dc33ab2b4b53aa1a7463494f90ec70d31efe5c593f33c63525bc80dd", 0xea}, {&(0x7f00000029c0)="33d9b29d8ddc6f99d767e18c0ca95c49046d9bb6928a62c1dabe37b396640ed26e2b1674b0b6b27e87e1ed047f6eb88c7ac9f5a5240a58603fb870e9ea7bce89008aa65f88ddadee36fbe0bfa461871c05ccef4d3b933b5c362d283ae2c8898682a143ebb69c9d9c4c31f03542d91fc48aa522b8f7da6d66be8519dcd3e89b52a187e9f9dfdf6bff83c81e0a63455d0159732c16da9471b30bf532fec60d4f4f6c74b36c95c784726d90c3f67e781871893aa356ceb426f254a80f3e2f60935104610c0ade7bb47e43e3cf93c290d62a5c1b7fa925e537074fb6d6", 0xdb}, {&(0x7f0000002ac0)="a40dc0922fdb865d2aa0821d93e91daec9b185867cc96b473c0e4ebf349f506813acf2079eb83b049c1ac4c4", 0x2c}], 0x4, &(0x7f0000002b40)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x4}}], 0x30}}], 0x8, 0xc001) 18:08:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x1013, 0x0, 0x0) 18:08:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x3, 0x10000, 0x0, 0x17, 0x100000000, 0xdee, 0x10, 0x2}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x2}, 0x2c) 18:08:12 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xb469, 0x20, 0x10001, 0x29c}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x9, 0x4000000000000, 0x8001}, &(0x7f0000000100)=0x10) setuid(0xee00) add_key$keyring(&(0x7f0000001200)='keyring\x00', &(0x7f0000001240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0x24, &(0x7f0000000140)='eth1vboxnet0{wlan1cgroup^GPLGPLppp0\x00'}, 0x30) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000001c0)=r2) 18:08:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x9e, 0x4, 0x88, "e8e66709ca9a93cc6e1920d5617b5d01", "2e9d875ad06e861762c13f5fe16e62b6f580bc4d818cad673074eab9f576f37998c8dc22270717aaf6cf9f1bdb9344514a1bd6dff8a727127ec2d8b5c11e15ce2eb1e3f183d708560869bdaba7217053568ba2942dcaaaa6e19434b196be1a5df3e2f5736ef0997ff50d8e4e64e4a670d9488ef454434ee721c1448723c4ad24c7fbb990a1ab7e2063"}, 0x9e, 0x2) r2 = syz_open_pts(r0, 0x88d82) r3 = dup3(r1, r0, 0x80000) bind$llc(r3, &(0x7f0000000000)={0x1a, 0xffff, 0xb5, 0x3, 0xdea, 0x3, @remote}, 0x10) write(r2, &(0x7f0000000000), 0xffffff86) [ 230.368799][ T24] kauditd_printk_skb: 5 callbacks suppressed [ 230.368815][ T24] audit: type=1400 audit(1560017292.372:56): avc: denied { map_read map_write } for pid=10114 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 18:08:13 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000140)='.dead\x00', &(0x7f0000000180)='\x00') r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 18:08:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x4008000000803, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="1200000012dc18ef007b00000000000000a1", 0xffffffffffffff16, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000440), 0x400020f, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e20, 0x3, @mcast1, 0x7}}, 0x0, 0x4, 0x0, "d3d251afcb8bd37bfa7735079235e6d3d8169939080545e5661b8554bcd7df13ca482daa5bda1122e5e1e8e208fe3ba5051c45068451ba5a73562b16088a88b8eefd83af1af85de33837704b7e9e41ba"}, 0xd8) 18:08:13 executing program 4: r0 = semget(0x3, 0x0, 0x88) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0xffffffff, 0x9, 0x401, 0x7, 0x80000000, 0x40, 0x101, 0x7d3, 0x4000000000000000, 0xca]) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='dir_umask=00000000000000000000005,codepage=iso8859-15,gid=', @ANYRESHEX]) 18:08:13 executing program 3: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) ustat(0x7, &(0x7f0000000040)) futex(&(0x7f0000000000), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) clock_settime(0x2, &(0x7f0000000080)={0x77359400}) 18:08:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000880)={0x10000, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0xa, [{{0x2, 0x4e24, @rand_addr=0x3}}, {{0x2, 0x4e20, @empty}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e23, @rand_addr=0xffffffff80000000}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e24, @rand_addr=0x2}}]}, 0x590) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) add_key$user(0x0, &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="d1f7977be36243adce5a9b3a5352795df19e8c4e6ae5296aa3f043607b184ed65348cc03584ad2f60df945484179bb0eb893c53b86ff45dfb7a43deed5a2866742bf07d14fed5419556322d161e203b63ca6332607f98e46057d0f097d1c5b273515bf522319c242fdbb8c7b423bef955b96e8337185ba7560e25b4760a1c4363f3d35ba3f9f0ec26165dd729ee9a99788c15bfdb064bf2c807c", 0x9a, 0xffffffffffffffff) add_key(&(0x7f0000000580)='ceph\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key(0x0, &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)="eb3f77f3a7b1", 0x6, 0xfffffffffffffffd) getsockopt(r1, 0x8001, 0xf335, &(0x7f0000000200)=""/163, &(0x7f0000000040)=0xa3) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10400, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000400)={{0x0, @multicast2, 0x4e24, 0x0, 'wlc\x00', 0x0, 0x7fff80000000000, 0x1e}, {@local, 0x4e23, 0x12000, 0xbaf, 0x4, 0x80000001}}, 0x44) r4 = syz_open_dev$mouse(0x0, 0x8, 0x10000) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, 0x0, 0x0) add_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) flistxattr(r4, &(0x7f0000000480)=""/70, 0x46) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f00000002c0)={0x1, 0xfffffffffffffffe}) r5 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000000)=""/38) acct(0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000001c0)) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) write$P9_RATTACH(r5, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x0, 0x0, 0x2003}}, 0x14) ioctl$sock_ifreq(r6, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 18:08:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r1) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x9e, 0x4, 0x88, "e8e66709ca9a93cc6e1920d5617b5d01", "2e9d875ad06e861762c13f5fe16e62b6f580bc4d818cad673074eab9f576f37998c8dc22270717aaf6cf9f1bdb9344514a1bd6dff8a727127ec2d8b5c11e15ce2eb1e3f183d708560869bdaba7217053568ba2942dcaaaa6e19434b196be1a5df3e2f5736ef0997ff50d8e4e64e4a670d9488ef454434ee721c1448723c4ad24c7fbb990a1ab7e2063"}, 0x9e, 0x2) r2 = syz_open_pts(r0, 0x88d82) r3 = dup3(r1, r0, 0x80000) bind$llc(r3, &(0x7f0000000000)={0x1a, 0xffff, 0xb5, 0x3, 0xdea, 0x3, @remote}, 0x10) write(r2, &(0x7f0000000000), 0xffffff86) [ 231.082790][T10138] hfs: invalid gid -1 [ 231.098902][T10138] hfs: unable to parse mount options [ 231.148053][ T24] audit: type=1400 audit(1560017293.152:57): avc: denied { ioctl } for pid=10135 comm="syz-executor.0" path="socket:[31356]" dev="sockfs" ino=31356 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 231.230242][ T24] audit: type=1800 audit(1560017293.152:58): pid=10146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16612 res=0 [ 231.230484][T10137] bond0: Releasing backup interface bond_slave_1 [ 231.256112][ T24] audit: type=1804 audit(1560017293.222:59): pid=10146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir780100818/syzkaller.BB5Mxz/21/file0" dev="sda1" ino=16612 res=1 18:08:13 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="2cf12a300570689503570fbb95a15cb9978c9438262b7661398e4cda53a14151f30babdef350bc6ae9fa82966e48eb6c2bb1bb794425e9a428d394925c90cc61666e3034a68a1ce055cb323ad06bc29a66b9700de1f7714029ca6c3e88fc51bef1c20e00dc351aa8f8af1f3d92d6579bda372f2230f9f46c0899240f32f864de2cdab012227ad7118e3742c0493383cd6ed268005973b9af0338130c97e9d15dcb8d02821d5faeb1ea276821e8b402d02b3344f85923e9136b93cb0a8109ec2e530f9f03fac9c762bb", 0xc9, 0xfffffffffffffffc) r0 = request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='eth1@securityvboxnet1\x00', 0xfffffffffffffffd) add_key(0x0, 0x0, 0x0, 0x11, r0) symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') removexattr(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc396}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x20000000) mount(0x0, &(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x200, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x36c) 18:08:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) r0 = socket(0x1b, 0x2, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0x9, 0x0, 0x1, 0x1, 0x20, 0x691, 0x9, 0x7]}) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000000)=0xa5c2, 0x4) 18:08:13 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x400) connect$netrom(r0, &(0x7f0000000140)={{0x3, @default}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000001c0)={0xfffffffffffffff8, 0xff, 0x5, 0x5, 0x4}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$mouse(&(0x7f00000008c0)='/dev/input/mouse#\x00', 0x1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000040)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 231.853277][T10163] bond0: Error: Device is in use and cannot be enslaved 18:08:14 executing program 5: rseq(&(0x7f0000000000), 0xffffffe1, 0x1fffffffffc, 0x0) rseq(&(0x7f0000000000), 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x81, 0x5, &(0x7f0000000280)=[{&(0x7f00000000c0)="393ba62425276fb62e", 0x9, 0xffffffffffffffff}, {&(0x7f0000000100)="27668082516bd8276da6e987a04b178ed654e86a1ddb3b7f7b56027f485050dbbb5289a79cc030968e1213d1f456c95896fda0ea4a55687444db92afa6a06523969376144a4863f785bbdc3a4e3543ccc5aff6ee1d27ee9da5d20d", 0x5b, 0x9}, {&(0x7f0000000180)="0847c8d084045f8fca3e63f7533128a9192f96b554662e562228257f03d72d41e1851791436a1a3e93d3f025aaf787589131881a5109aae5", 0x38, 0x7fffffff}, {&(0x7f00000001c0)="994624de407ebdf83b3ff93aff404abaa9bd8825498a5ea9341a49210338b4146eeaf244d5fad1a4f1b2d6f11ea4fd5daf6e00e790d363b764e7a8", 0x3b, 0x2}, {&(0x7f0000000200)="d8618428730e60689f4611022197f0e2ce4de7886604a28670186409aa2c3c88e8af1610a40c60630966c5ddb314e8b3c656921de49a631f69273ab5dd6b9361ec7a575a0e9b54c9642630d3627a9b255f98e5", 0x53, 0x1ff}], 0x808, &(0x7f0000000500)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}], [{@dont_appraise='dont_appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<', r0}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fowner_lt={'fowner<', r1}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) 18:08:14 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2, 0x0) getpeername$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4209, r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam\b\x00\x01\x17\x8b\xa8\xc0\xdf\xe3\xe7\xff\xff\xff'}) ptrace$setregset(0x4209, r2, 0x20000004, 0x0) 18:08:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 232.362632][T10189] erofs: read_super, device -> /dev/loop5 [ 232.380457][T10189] erofs: options -> user_xattr,nouser_xattr,noacl,dont_appraise,permit_directio,euid<00000000000000000000,mask=MAY_EXEC,fowner<00000000000000000000,mask=^MAY_EXEC, 18:08:14 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x100000007, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000080)='lo/&\x00') 18:08:14 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000012ffc), 0x6, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x3) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000040)={0x6, r1}) 18:08:14 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x822, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000ac0)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000f40)=""/4096, 0x18}, {&(0x7f0000000100)=""/194, 0x18}, {&(0x7f0000000000)=""/3}, {&(0x7f0000000040)=""/39}, {&(0x7f0000000080)=""/41}, {&(0x7f0000000200)=""/218}, {&(0x7f0000000480)=""/169}], 0x339) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000300)=0x40, 0x4) [ 232.428744][T10189] erofs: cannot find valid erofs superblock 18:08:14 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8000, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@access_any='access=any'}], [{@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '(/+.-}-\\]proc[+cpuset.'}}, {@euid_eq={'euid', 0x3d, r0}}]}}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$ax25(r1, &(0x7f00000001c0)="dff67eb1ca2365cb5c120a8f6a71d3cfb70d3a847763086c83eeb217b17c620b", 0x20, 0xc085, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) 18:08:14 executing program 5: socket$bt_cmtp(0x1f, 0x3, 0x5) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000580)='ceph\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x80400) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000180)={0x63, "a01de78ce892ab3ec8593978f4879ed022e0e43e0c6b109450ac5fc3468c0ab32414b7dd1d59a318a1f1aef33189c46a469c0099350b93b46ff8f9dd6f6c885e91abef587dc345665d9b4403b8fa2265aa208f2f129016d77ca3a29c4abddb7679afc978a2df9b16c2c14f832d4fc478ed6d48b04acf94c47212d443ca54b87b"}) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$mouse(0x0, 0x0, 0x10000) add_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840)={'syz', 0x2}, &(0x7f0000000880)="2e1aaa464e95c2eb649fe6f76a62351e25d2503da15b4f9fed26", 0x1a, 0xfffffffffffffffc) r1 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) acct(0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write$P9_RATTACH(r1, &(0x7f0000000140)={0x14, 0x69, 0x0, {0x0, 0x0, 0x3}}, 0x14) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 18:08:14 executing program 3: r0 = socket$inet6(0xa, 0x80800, 0xfffffffffffffffe) restart_syscall() ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") splice(r0, &(0x7f0000000200), r0, &(0x7f0000000240), 0xbac, 0x6) ppoll(0x0, 0x0, 0x0, &(0x7f00000002c0), 0xffffffffffffffb8) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000300)=0xfffffffffffffffa, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000180)={r0}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r3, 0x3, 0x0, 0x1ff}, &(0x7f0000000140)=0x10) [ 232.671344][T10208] input: syz1 as /devices/virtual/input/input7 18:08:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:14 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 232.822943][T10216] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 232.854382][T10216] MINIX-fs: bad superblock or unable to read bitmaps 18:08:14 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 232.948583][T10216] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 232.962811][T10213] bond0: Releasing backup interface bond_slave_1 [ 233.011710][T10216] MINIX-fs: bad superblock or unable to read bitmaps [ 233.015601][T10235] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 233.067030][T10235] 9pnet: p9_fd_create_tcp (10235): problem connecting socket to 127.0.0.1 18:08:15 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8000, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@access_any='access=any'}], [{@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '(/+.-}-\\]proc[+cpuset.'}}, {@euid_eq={'euid', 0x3d, r0}}]}}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$ax25(r1, &(0x7f00000001c0)="dff67eb1ca2365cb5c120a8f6a71d3cfb70d3a847763086c83eeb217b17c620b", 0x20, 0xc085, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) 18:08:15 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:15 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 233.373925][T10240] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 233.410467][T10243] 9pnet: p9_fd_create_tcp (10243): problem connecting socket to 127.0.0.1 18:08:15 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x8000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0xe7}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x8000000000}) [ 233.412671][T10240] MINIX-fs: bad superblock or unable to read bitmaps 18:08:15 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8000, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@access_any='access=any'}], [{@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '(/+.-}-\\]proc[+cpuset.'}}, {@euid_eq={'euid', 0x3d, r0}}]}}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$ax25(r1, &(0x7f00000001c0)="dff67eb1ca2365cb5c120a8f6a71d3cfb70d3a847763086c83eeb217b17c620b", 0x20, 0xc085, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) [ 233.615558][T10249] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 233.630599][T10249] MINIX-fs: bad superblock or unable to read bitmaps [ 233.638852][T10224] bond0: Enslaving bond_slave_1 as an active interface with an up link 18:08:15 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8000, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@access_any='access=any'}], [{@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '(/+.-}-\\]proc[+cpuset.'}}, {@euid_eq={'euid', 0x3d, r0}}]}}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$ax25(r1, &(0x7f00000001c0)="dff67eb1ca2365cb5c120a8f6a71d3cfb70d3a847763086c83eeb217b17c620b", 0x20, 0xc085, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) [ 233.666457][T10249] 9pnet: p9_fd_create_tcp (10249): problem connecting socket to 127.0.0.1 [ 233.808959][T10257] 9pnet: p9_fd_create_tcp (10257): problem connecting socket to 127.0.0.1 [ 233.813439][T10255] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 233.858052][T10255] MINIX-fs: bad superblock or unable to read bitmaps [ 234.336266][T10245] bond0: Releasing backup interface bond_slave_1 18:08:16 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x800, 0x80000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r1, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000180)=0x8, 0x4) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYRESHEX=r0], 0x3}}, 0x0) 18:08:16 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8000, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@access_any='access=any'}], [{@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '(/+.-}-\\]proc[+cpuset.'}}, {@euid_eq={'euid', 0x3d, r0}}]}}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$ax25(r1, &(0x7f00000001c0)="dff67eb1ca2365cb5c120a8f6a71d3cfb70d3a847763086c83eeb217b17c620b", 0x20, 0xc085, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) [ 234.436619][T10246] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 234.506984][T10262] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 234.525097][T10262] MINIX-fs: bad superblock or unable to read bitmaps [ 234.541859][T10268] 9pnet: p9_fd_create_tcp (10268): problem connecting socket to 127.0.0.1 18:08:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:16 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x20040001) 18:08:16 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8000, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@access_any='access=any'}], [{@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '(/+.-}-\\]proc[+cpuset.'}}, {@euid_eq={'euid', 0x3d, r0}}]}}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 18:08:16 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:16 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:16 executing program 4: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="55a60180c20000000180c2000400884800005f0de1bd932036460a9b4f5ca4b78b4f154a8ca276907dcd69ebecfe442569651b85017a1780ef5d465de3f0ad652b58b7711813bd381fa9558ae163ab53e106d0037cc1de5e917e732cceb3c8d460b97d64a2df51c97bd39edb4bdcdfc1bb54458fad08c0856f6f420d260d2563f484e472ada6dd809c1fc107b7b2117e5a115986629701039b9128e81107d103df24d749e870373de3f5570bccf2df4424689ed33a97f819479f8a5c841d74f7f7bacd10ef369b4cd0af661ff36ebb742a8cbba35d0673eff9c4aedf58d3e1a14539688e17559c65c3d8"], 0x0) 18:08:16 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000400)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000000)=""/98) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000140)={0x1f, 0x9, 0x9, 0x5}) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2050}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0e0025bd7000ffdbdf2502000000080002000a0000000400050008000b00b4f517fa619bd889b71576baf983226067c05f4c20f9b74898e57b25225d1f35c2d9996de379347c2baa9923735f7508c7789cfa40b9f6c7aa1b8504f037addc5b09112de18c3577d21551d59bf09b0741d5781164ad138a6b8c6de9208e3c1bb7014c29ecc82637e0f6446a1e75ba9755de6023ce56daebdfacf4d77f8a93b6e86bb026a20ebade1b6a9c3e89ccd73e5585c4b54e79e8a0b427ad3ab15b7e1b16555f306fd6ddf8a3c582a3da78fcf9a1dcef6050a1c0d3781707093442b921e50b9fdd44eb00"/257, @ANYRES32=r3], 0x4}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x4000000) [ 234.806047][T10275] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 234.884363][T10275] MINIX-fs: bad superblock or unable to read bitmaps 18:08:17 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 234.935566][T10279] 9pnet: p9_fd_create_tcp (10279): problem connecting socket to 127.0.0.1 18:08:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:17 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 18:08:17 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:08:17 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8000, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@access_any='access=any'}], [{@context={'context', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, '(/+.-}-\\]proc[+cpuset.'}}, {@euid_eq={'euid', 0x3d, r0}}]}}) [ 235.216482][T10293] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 235.233984][T10293] MINIX-fs: bad superblock or unable to read bitmaps [ 235.264008][T10296] 9pnet: p9_fd_create_tcp (10296): problem connecting socket to 127.0.0.1 18:08:17 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) [ 235.451034][T10300] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 235.501241][T10300] MINIX-fs: bad superblock or unable to read bitmaps 18:08:17 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 235.770185][T10307] MINIX-fs: file system does not have enough imap blocks allocated. Refusing to mount. [ 235.843981][T10307] MINIX-fs: bad superblock or unable to read bitmaps 18:08:18 executing program 2: syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 18:08:18 executing program 2: syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 18:08:18 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:08:18 executing program 2: syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 237.311872][T10335] IPVS: ftp: loaded support on port[0] = 21 [ 237.502431][T10335] chnl_net:caif_netlink_parms(): no params data found [ 237.548779][T10335] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.556343][T10335] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.565031][T10335] device bridge_slave_0 entered promiscuous mode [ 237.573018][T10335] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.580255][T10335] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.588096][T10335] device bridge_slave_1 entered promiscuous mode [ 237.612359][T10335] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.623705][T10335] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.648143][T10335] team0: Port device team_slave_0 added [ 237.655830][T10335] team0: Port device team_slave_1 added [ 237.727881][T10335] device hsr_slave_0 entered promiscuous mode [ 237.774265][T10335] device hsr_slave_1 entered promiscuous mode [ 237.854754][T10335] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.861853][T10335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.869338][T10335] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.876497][T10335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.966704][T10335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.978794][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.988447][ T2999] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.999368][ T2999] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.017850][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 238.049425][T10335] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.105265][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.140842][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.148017][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.185739][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.194815][ T9608] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.201916][ T9608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.228027][T10342] IPVS: ftp: loaded support on port[0] = 21 [ 238.229373][T10343] IPVS: ftp: loaded support on port[0] = 21 [ 238.726645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.735828][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.745228][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.778707][T10341] IPVS: ftp: loaded support on port[0] = 21 [ 239.017846][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.027621][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.296309][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.306888][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.568530][T10335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.194557][T10342] chnl_net:caif_netlink_parms(): no params data found [ 240.246841][T10335] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 240.599823][T10341] chnl_net:caif_netlink_parms(): no params data found [ 240.642287][T10343] chnl_net:caif_netlink_parms(): no params data found 18:08:22 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 240.970874][T10342] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.978667][T10342] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.987129][T10342] device bridge_slave_0 entered promiscuous mode [ 241.437294][T10342] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.444775][T10342] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.452467][T10342] device bridge_slave_1 entered promiscuous mode [ 241.460218][T10341] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.467675][T10341] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.475896][T10341] device bridge_slave_0 entered promiscuous mode [ 241.483864][T10341] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.490934][T10341] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.499521][T10341] device bridge_slave_1 entered promiscuous mode [ 241.550613][ T31] device bridge_slave_1 left promiscuous mode [ 241.568925][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.627419][ T31] device bridge_slave_0 left promiscuous mode [ 241.633662][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.702085][ T31] device bridge_slave_1 left promiscuous mode [ 241.708491][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.755505][ T31] device bridge_slave_0 left promiscuous mode [ 241.761768][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.805150][ T31] device bridge_slave_1 left promiscuous mode [ 241.811378][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.874923][ T31] device bridge_slave_0 left promiscuous mode [ 241.881192][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.935469][ T31] device bridge_slave_1 left promiscuous mode [ 241.941672][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.995281][ T31] device bridge_slave_0 left promiscuous mode [ 242.001463][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.878373][ T31] device hsr_slave_1 left promiscuous mode [ 248.927279][ T31] device hsr_slave_0 left promiscuous mode [ 248.988384][ T31] team0 (unregistering): Port device team_slave_1 removed [ 249.002087][ T31] team0 (unregistering): Port device team_slave_0 removed [ 249.013658][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 249.050450][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 249.133170][ T31] bond0 (unregistering): Released all slaves [ 249.306123][ T31] device hsr_slave_1 left promiscuous mode [ 249.359640][ T31] device hsr_slave_0 left promiscuous mode [ 249.407846][ T31] team0 (unregistering): Port device team_slave_1 removed [ 249.422308][ T31] team0 (unregistering): Port device team_slave_0 removed [ 249.434056][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 249.489195][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 249.583583][ T31] bond0 (unregistering): Released all slaves [ 249.747433][ T31] device hsr_slave_1 left promiscuous mode [ 249.789866][ T31] device hsr_slave_0 left promiscuous mode [ 249.849227][ T31] team0 (unregistering): Port device team_slave_1 removed [ 249.871185][ T31] team0 (unregistering): Port device team_slave_0 removed [ 249.882728][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 249.948750][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 250.040785][ T31] bond0 (unregistering): Released all slaves [ 250.206201][ T31] device hsr_slave_1 left promiscuous mode [ 250.260035][ T31] device hsr_slave_0 left promiscuous mode [ 250.319333][ T31] team0 (unregistering): Port device team_slave_1 removed [ 250.331516][ T31] team0 (unregistering): Port device team_slave_0 removed [ 250.347366][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 250.458694][ T31] bond0 (unregistering): Released all slaves [ 250.588110][T10342] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.610647][T10342] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.622926][T10343] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.630251][T10343] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.639793][T10343] device bridge_slave_0 entered promiscuous mode [ 250.649861][T10341] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.666764][T10343] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.674505][T10343] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.686130][T10343] device bridge_slave_1 entered promiscuous mode [ 250.696401][T10341] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.725955][T10342] team0: Port device team_slave_0 added [ 250.740162][T10341] team0: Port device team_slave_0 added [ 250.747456][T10342] team0: Port device team_slave_1 added [ 250.758977][T10341] team0: Port device team_slave_1 added [ 250.773007][T10343] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.796048][T10343] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.887128][T10342] device hsr_slave_0 entered promiscuous mode [ 250.924304][T10342] device hsr_slave_1 entered promiscuous mode [ 250.969315][T10343] team0: Port device team_slave_0 added [ 251.027092][T10341] device hsr_slave_0 entered promiscuous mode [ 251.074342][T10341] device hsr_slave_1 entered promiscuous mode [ 251.155999][T10343] team0: Port device team_slave_1 added [ 251.255825][T10343] device hsr_slave_0 entered promiscuous mode [ 251.295195][T10343] device hsr_slave_1 entered promiscuous mode [ 251.408005][T10342] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.452813][T10342] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.466282][ T9612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.475282][ T9612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.491906][T10341] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.505205][ T9612] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 251.529329][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.539571][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.548162][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.557169][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.566060][T10287] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.573136][T10287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.583750][T10341] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.600361][T10343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.609167][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 251.617422][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.625680][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.634834][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.643175][T10287] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.650280][T10287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.658791][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.679432][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.689039][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.698162][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.705298][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.713275][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.722818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.731558][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.739944][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.747117][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.757249][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.765595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.774720][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.783464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.807671][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.819963][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.828767][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.837977][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.862172][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.871675][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.881062][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.890188][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.899260][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.907878][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.916558][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.925817][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.934453][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.942959][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.952462][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.969279][T10343] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.993229][T10342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.001624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.014478][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.022779][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.029947][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.038288][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.047012][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.055554][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.062605][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.070307][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.079998][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.088851][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.214362][T10341] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.228389][T10341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.238016][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.247055][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.255520][T10287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.350490][T10342] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.374592][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.389136][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.407362][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.423723][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.433123][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.443036][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.463540][T10341] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.485181][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.501308][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.535257][T10343] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.559279][T10343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.579778][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.593071][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.649663][T10343] 8021q: adding VLAN 0 to HW filter on device batadv0 18:08:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") unshare(0x0) 18:08:34 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 18:08:35 executing program 4: chroot(&(0x7f0000000180)='./bus\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_TSC(0x1a, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) uname(0x0) fallocate(r0, 0x0, 0x0, 0x1000100) unshare(0x2060100) r1 = open(0x0, 0x14103e, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./bus\x00', 0x6, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000100)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000280)={{0xa, 0x4e23, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3}, {0xa, 0x4e24, 0x3, @mcast2, 0xb363}, 0xe5f, [0x1, 0xe8a7, 0x0, 0x0, 0x10000, 0x1, 0xffffffff7fffffff, 0x4]}, 0x5c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000200)={'veth0_to_bond\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="33000000ff7f00007646674c6a65e6867fd1ee813d5a68704cc0943cd1c1c6288dc36db2b679e5cd7627852df1c4aba34ccdd422e6e5d6e31b23b18e7bab041736982136aa3819ffcb1f81472f7426fb4a9adb6ce4c7137ab8ea4ce11360d7585cfcaf173c7dfb63899e4e9c87573e525a0f906d17810946d25f4ce570935b0e36505b32"]}) ftruncate(r0, 0x8) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) socket$inet6(0xa, 0xb, 0x3) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x0) 18:08:35 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:08:35 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 18:08:35 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x1], 0x1f004}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="b8010000000f01c1f20f01df64640f07660fe94000b8010000000f01d90f353e0f232fb9f30800000f3266ba420066ed0f20d835200000000f22d8", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getpgrp(0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x0) 18:08:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 18:08:35 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:08:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:08:36 executing program 4: modify_ldt$write(0x1, &(0x7f0000000200), 0x10) modify_ldt$read(0x0, &(0x7f00000002c0)=""/224, 0xe0) 18:08:36 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") rmdir(&(0x7f0000000600)='./file0//ile0\x00') 18:08:36 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', 0x0, 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 18:08:36 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 18:08:36 executing program 4: modify_ldt$write(0x1, &(0x7f0000000200), 0x10) modify_ldt$read(0x0, &(0x7f00000002c0)=""/224, 0xe0) 18:08:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f00000003c0)={[], 0x1, 0x1, 0x0, 0x0, 0x8, 0x7004, 0x1, [], 0xfffffffffffffffb}) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@ipv4={[], [], @multicast2}, 0x2f, r1}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) geteuid() openat$random(0xffffffffffffff9c, 0x0, 0xfc, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x284) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sync() ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000300)={0x0, 0x0, 0x40, 0x0, 0x0, "a68e9eb74c27bd0a63b4f078e1a238777c1afe", 0x0, 0x10000}) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000002c0)) write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) [ 254.513167][T10412] MINIX-fs: bad superblock or unable to read bitmaps [ 256.167784][T10426] IPVS: ftp: loaded support on port[0] = 21 [ 256.493075][T10429] IPVS: ftp: loaded support on port[0] = 21 [ 256.509622][T10430] IPVS: ftp: loaded support on port[0] = 21 [ 256.747579][T10426] chnl_net:caif_netlink_parms(): no params data found [ 256.990451][T10426] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.998056][T10426] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.007002][T10426] device bridge_slave_0 entered promiscuous mode [ 257.026257][T10426] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.033436][T10426] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.041633][T10426] device bridge_slave_1 entered promiscuous mode [ 257.267285][T10426] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 257.280485][T10426] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 257.507644][T10426] team0: Port device team_slave_0 added [ 257.533329][T10430] chnl_net:caif_netlink_parms(): no params data found [ 257.544589][T10426] team0: Port device team_slave_1 added [ 257.832722][T10429] chnl_net:caif_netlink_parms(): no params data found [ 257.868557][T10430] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.875909][T10430] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.883675][T10430] device bridge_slave_0 entered promiscuous mode [ 257.926122][T10426] device hsr_slave_0 entered promiscuous mode [ 257.964283][T10426] device hsr_slave_1 entered promiscuous mode [ 258.196180][T10430] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.203338][T10430] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.211860][T10430] device bridge_slave_1 entered promiscuous mode [ 258.446544][T10429] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.453716][T10429] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.461855][T10429] device bridge_slave_0 entered promiscuous mode [ 258.471313][T10429] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.480161][T10429] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.488207][T10429] device bridge_slave_1 entered promiscuous mode [ 258.497821][T10430] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 258.508019][ T31] device bridge_slave_1 left promiscuous mode [ 258.515021][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.545325][ T31] device bridge_slave_0 left promiscuous mode [ 258.551544][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.605826][ T31] device bridge_slave_1 left promiscuous mode [ 258.612039][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.645197][ T31] device bridge_slave_0 left promiscuous mode [ 258.651452][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.705828][ T31] device bridge_slave_1 left promiscuous mode [ 258.712058][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.754722][ T31] device bridge_slave_0 left promiscuous mode [ 258.760948][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.816001][ T31] device hsr_slave_1 left promiscuous mode [ 263.879566][ T31] device hsr_slave_0 left promiscuous mode [ 263.920483][ T31] team0 (unregistering): Port device team_slave_1 removed [ 263.932253][ T31] team0 (unregistering): Port device team_slave_0 removed [ 263.945489][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 264.000328][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 264.072262][ T31] bond0 (unregistering): Released all slaves [ 264.217197][ T31] device hsr_slave_1 left promiscuous mode [ 264.257437][ T31] device hsr_slave_0 left promiscuous mode [ 264.310168][ T31] team0 (unregistering): Port device team_slave_1 removed [ 264.321968][ T31] team0 (unregistering): Port device team_slave_0 removed [ 264.336140][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 264.398382][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 264.501816][ T31] bond0 (unregistering): Released all slaves [ 264.666336][ T31] device hsr_slave_1 left promiscuous mode [ 264.739588][ T31] device hsr_slave_0 left promiscuous mode [ 264.799067][ T31] team0 (unregistering): Port device team_slave_1 removed [ 264.811140][ T31] team0 (unregistering): Port device team_slave_0 removed [ 264.826109][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 264.900220][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 264.971889][ T31] bond0 (unregistering): Released all slaves [ 265.080986][T10430] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 265.101395][T10429] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 265.127747][T10429] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 265.147779][T10430] team0: Port device team_slave_0 added [ 265.160935][T10430] team0: Port device team_slave_1 added [ 265.186028][T10429] team0: Port device team_slave_0 added [ 265.198586][T10429] team0: Port device team_slave_1 added [ 265.267142][T10429] device hsr_slave_0 entered promiscuous mode [ 265.304331][T10429] device hsr_slave_1 entered promiscuous mode [ 265.427356][T10430] device hsr_slave_0 entered promiscuous mode [ 265.474444][T10430] device hsr_slave_1 entered promiscuous mode [ 265.565212][T10426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.611430][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.620163][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.630184][T10426] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.658598][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.669108][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.678675][ T9608] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.685795][ T9608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.693546][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.702824][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.711416][ T9608] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.718497][ T9608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.727289][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.761529][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 265.770706][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 265.792447][T10429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.810410][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 265.819481][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.828621][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.838193][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 265.859204][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.868035][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.877259][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.887185][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.906095][T10430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.919782][T10429] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.928438][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.936949][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.945714][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.953494][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.962414][T10426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.065476][T10430] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.113355][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.122418][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.131078][ T3647] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.138258][ T3647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.146797][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.155358][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.164690][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.173300][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.181895][ T3647] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.189154][ T3647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.198157][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.219393][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.229127][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.237946][T10356] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.245092][T10356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.254823][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.263745][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.272728][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.281375][T10356] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.288507][T10356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.304471][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.340565][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.350109][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.366412][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.380992][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.391197][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.407275][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.420738][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.432506][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.463536][T10426] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.480406][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.493351][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.518104][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.531730][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.541601][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.559986][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.583740][T10430] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 266.596084][T10430] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 266.610732][T10429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.620532][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.630259][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.650449][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.676387][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.685556][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.694880][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.703427][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.712975][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.784811][T10430] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.810082][T10429] 8021q: adding VLAN 0 to HW filter on device batadv0 18:08:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:48 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:08:48 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) 18:08:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f00000003c0)={[], 0x1, 0x1, 0x0, 0x0, 0x8, 0x7004, 0x1, [], 0xfffffffffffffffb}) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@ipv4={[], [], @multicast2}, 0x2f, r1}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) geteuid() openat$random(0xffffffffffffff9c, 0x0, 0xfc, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x284) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) sync() ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000300)={0x0, 0x0, 0x40, 0x0, 0x0, "a68e9eb74c27bd0a63b4f078e1a238777c1afe", 0x0, 0x10000}) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000002c0)) write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) [ 267.014115][T10452] MINIX-fs: bad superblock or unable to read bitmaps 18:08:49 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) [ 267.420309][T10470] MINIX-fs: bad superblock or unable to read bitmaps 18:08:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:08:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") unshare(0x2000400) fsync(0xffffffffffffffff) 18:08:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) ftruncate(0xffffffffffffffff, 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r0, &(0x7f0000000240)=""/4096, 0x1000) 18:08:50 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) 18:08:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:50 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 18:08:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) [ 268.168152][T10488] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000003c0)={[], 0x1, 0x1, 0x0, 0x0, 0x8, 0x7004, 0x1, [], 0xfffffffffffffffb}) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={@ipv4={[], [], @multicast2}, 0x2f, r2}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) geteuid() openat$random(0xffffffffffffff9c, 0x0, 0xfc, 0x0) write$UHID_CREATE(r1, 0x0, 0x284) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000040)) sync() ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000100)={0x0, 0x10000, 0x4, 'queue0\x00', 0x1}) epoll_create1(0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000300)={0x0, 0x0, 0x40, 0x0, 0x0, "a68e9eb74c27bd0a63b4f078e1a238777c1afe", 0x0, 0x10000}) r4 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000002c0)) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0x100000001}}, 0x18) 18:08:50 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) 18:08:50 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) 18:08:50 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0xa, 0x8, "5842d6dcab0b5a5894bb35d4d625db59f06a45498e71b42412fc864063be1c56841392781d0250dcc99ec99e37ee6b07ef49ad5566414b8f0f3621615f030e83", "986cb9a4415e8405fe3a76069f650cd7de0b8529dd809932f110ec854ab66f48644722070fe387d1d284ef662361469e0ba3b49b91b940cf6d3024b0b5fba155", "beb256eb29e8dcd859cc8724c38fe971d5e2617dd9a5dd73d8f031ca6eae04ee", [0x9f5]}) r1 = socket$inet6(0xa, 0x3, 0x1) dup(0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0xd9, 0x20008800) fcntl$getflags(0xffffffffffffffff, 0x40a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 268.626319][T10508] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:08:50 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) 18:08:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) 18:08:51 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00D\x7f\rA\x94\x00}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00\x00\x00\x00\x00\x00\x00\x151X2\xb0(\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 269.227340][T10526] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:51 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0xa, 0x8, "5842d6dcab0b5a5894bb35d4d625db59f06a45498e71b42412fc864063be1c56841392781d0250dcc99ec99e37ee6b07ef49ad5566414b8f0f3621615f030e83", "986cb9a4415e8405fe3a76069f650cd7de0b8529dd809932f110ec854ab66f48644722070fe387d1d284ef662361469e0ba3b49b91b940cf6d3024b0b5fba155", "beb256eb29e8dcd859cc8724c38fe971d5e2617dd9a5dd73d8f031ca6eae04ee", [0x9f5]}) r1 = socket$inet6(0xa, 0x3, 0x1) dup(0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0xd9, 0x20008800) fcntl$getflags(0xffffffffffffffff, 0x40a) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 271.024337][T10547] IPVS: ftp: loaded support on port[0] = 21 [ 271.149717][T10547] chnl_net:caif_netlink_parms(): no params data found [ 271.245489][T10547] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.252644][T10547] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.260480][T10547] device bridge_slave_0 entered promiscuous mode [ 271.268495][T10547] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.276677][T10547] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.285380][T10547] device bridge_slave_1 entered promiscuous mode [ 271.366059][T10547] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 271.376233][T10547] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.451647][T10547] team0: Port device team_slave_0 added [ 271.460414][T10547] team0: Port device team_slave_1 added [ 271.526132][T10547] device hsr_slave_0 entered promiscuous mode [ 271.564262][T10547] device hsr_slave_1 entered promiscuous mode [ 271.669267][T10547] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.676403][T10547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.684431][T10547] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.691497][T10547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.793610][T10547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.805075][ T31] device bridge_slave_1 left promiscuous mode [ 271.811342][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.854603][ T31] device bridge_slave_0 left promiscuous mode [ 271.860785][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.508651][ T31] device hsr_slave_1 left promiscuous mode [ 273.570528][ T31] device hsr_slave_0 left promiscuous mode [ 273.627164][ T31] team0 (unregistering): Port device team_slave_1 removed [ 273.641136][ T31] team0 (unregistering): Port device team_slave_0 removed [ 273.652988][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 273.700933][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 273.792658][ T31] bond0 (unregistering): Released all slaves [ 273.872273][T10547] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.879957][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.893009][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.901814][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.913162][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 273.927510][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.936458][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.945060][ T9608] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.952385][ T9608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.963081][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.972761][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.981797][ T3647] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.988902][ T3647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.006407][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 274.017627][ T9608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 274.095285][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.104344][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.113029][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.121875][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.131678][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 274.140362][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.149806][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 274.163086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 274.175234][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.187415][T10547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 274.213022][T10547] 8021q: adding VLAN 0 to HW filter on device batadv0 18:08:56 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:56 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000240), 0x0, 0x0) 18:08:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) 18:08:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000002540)={'hsr0\x00', 0x43732e5398416f1a}) close(r0) 18:08:56 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) 18:08:56 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000740)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, 0x0) 18:08:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00D\x7f\rA\x94\x00}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00\x00\x00\x00\x00\x00\x00\x151X2\xb0(\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x22, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 274.531476][T10565] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:56 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000240), 0x0, 0x0) 18:08:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) [ 274.860620][T10583] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x8000000856}, 0x98) 18:08:57 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000000240), 0x0, 0x0) 18:08:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) [ 275.239890][T10596] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:57 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:57 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 18:08:57 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 275.732337][T10612] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:58 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) 18:08:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:08:58 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 18:08:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:08:58 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:08:58 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 276.063710][T10622] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:08:58 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x400}], 0x0, 0x0) [ 276.423132][T10634] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, 0xffffffffffffffff) 18:08:58 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000), 0x0, 0x400}], 0x0, 0x0) 18:08:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, 0xffffffffffffffff) [ 276.871964][T10644] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:58 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000), 0x0, 0x400}], 0x0, 0x0) [ 277.103853][T10650] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:08:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:08:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, 0xffffffffffffffff) 18:08:59 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000), 0x0, 0x400}], 0x0, 0x0) [ 277.383681][T10659] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 278.402303][T10670] IPVS: ftp: loaded support on port[0] = 21 [ 278.486375][T10670] chnl_net:caif_netlink_parms(): no params data found [ 278.516984][T10670] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.524266][T10670] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.531956][T10670] device bridge_slave_0 entered promiscuous mode [ 278.540612][T10670] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.547990][T10670] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.556194][T10670] device bridge_slave_1 entered promiscuous mode [ 278.574896][T10670] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 278.585402][T10670] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 278.603928][T10670] team0: Port device team_slave_0 added [ 278.610764][T10670] team0: Port device team_slave_1 added [ 278.676985][T10670] device hsr_slave_0 entered promiscuous mode [ 278.714318][T10670] device hsr_slave_1 entered promiscuous mode [ 279.111589][T10670] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.118714][T10670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.126123][T10670] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.133194][T10670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.142799][ T3647] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.150657][ T3647] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.368551][T10670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.380120][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.388514][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.573911][T10670] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.584242][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.592898][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.603542][ T3647] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.610699][ T3647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.793254][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.802307][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.810853][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.818058][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.016669][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 280.028245][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 280.037066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 280.046790][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 280.056838][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 280.072557][T10670] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 280.083402][T10670] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 280.272811][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 280.281790][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 280.290430][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 280.299342][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.308176][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 280.317993][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.326586][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 280.521478][T10670] 8021q: adding VLAN 0 to HW filter on device batadv0 18:09:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:02 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(0xffffffffffffffff, r0) 18:09:02 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a0090", 0x9, 0x400}], 0x0, 0x0) 18:09:02 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:02 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 280.954597][T10681] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:03 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(0xffffffffffffffff, r0) 18:09:03 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a0090", 0x9, 0x400}], 0x0, 0x0) 18:09:03 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(0xffffffffffffffff, r0) 18:09:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 281.408553][T10699] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:09:03 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a0090", 0x9, 0x400}], 0x0, 0x0) 18:09:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) [ 281.741922][T10711] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:03 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1a", 0xe, 0x400}], 0x0, 0x0) [ 282.034232][T10720] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 282.500449][ T31] device bridge_slave_1 left promiscuous mode [ 282.506861][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.564736][ T31] device bridge_slave_0 left promiscuous mode [ 282.580035][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.675123][ T31] device bridge_slave_1 left promiscuous mode [ 282.681314][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.734964][ T31] device bridge_slave_0 left promiscuous mode [ 282.741185][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.777150][ T31] device bridge_slave_1 left promiscuous mode [ 282.783338][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.835234][ T31] device bridge_slave_0 left promiscuous mode [ 282.841436][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.677118][ T31] device hsr_slave_1 left promiscuous mode [ 287.737258][ T31] device hsr_slave_0 left promiscuous mode [ 287.798047][ T31] team0 (unregistering): Port device team_slave_1 removed [ 287.809141][ T31] team0 (unregistering): Port device team_slave_0 removed [ 287.822892][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 287.888845][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 288.001587][ T31] bond0 (unregistering): Released all slaves [ 288.147518][ T31] device hsr_slave_1 left promiscuous mode [ 288.189805][ T31] device hsr_slave_0 left promiscuous mode [ 288.249327][ T31] team0 (unregistering): Port device team_slave_1 removed [ 288.261012][ T31] team0 (unregistering): Port device team_slave_0 removed [ 288.272941][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 288.311322][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 288.411610][ T31] bond0 (unregistering): Released all slaves [ 288.599450][ T31] device hsr_slave_1 left promiscuous mode [ 288.659708][ T31] device hsr_slave_0 left promiscuous mode [ 288.719137][ T31] team0 (unregistering): Port device team_slave_1 removed [ 288.731926][ T31] team0 (unregistering): Port device team_slave_0 removed [ 288.743465][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 288.781202][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 288.892077][ T31] bond0 (unregistering): Released all slaves [ 288.988472][T10728] IPVS: ftp: loaded support on port[0] = 21 [ 289.000934][T10730] IPVS: ftp: loaded support on port[0] = 21 [ 289.148722][T10728] chnl_net:caif_netlink_parms(): no params data found [ 289.193313][T10728] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.202010][T10728] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.209878][T10728] device bridge_slave_0 entered promiscuous mode [ 289.228188][T10728] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.235487][T10728] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.243335][T10728] device bridge_slave_1 entered promiscuous mode [ 289.280229][T10728] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 289.296870][T10728] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 289.305381][T10730] chnl_net:caif_netlink_parms(): no params data found [ 289.338482][T10728] team0: Port device team_slave_0 added [ 289.347167][T10728] team0: Port device team_slave_1 added [ 289.395697][T10728] device hsr_slave_0 entered promiscuous mode [ 289.447438][T10728] device hsr_slave_1 entered promiscuous mode [ 289.526850][T10730] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.534149][T10730] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.541852][T10730] device bridge_slave_0 entered promiscuous mode [ 289.550101][T10730] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.557642][T10730] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.566282][T10730] device bridge_slave_1 entered promiscuous mode [ 289.581680][T10728] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.588838][T10728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.596282][T10728] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.603382][T10728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.623228][T10730] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 289.640021][T10730] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 289.669083][T10730] team0: Port device team_slave_0 added [ 289.678494][T10730] team0: Port device team_slave_1 added [ 289.767127][T10730] device hsr_slave_0 entered promiscuous mode [ 289.804284][T10730] device hsr_slave_1 entered promiscuous mode [ 290.063029][T10356] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.070738][T10356] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.096377][T10728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.118792][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.127547][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.139371][T10728] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.152250][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.161898][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.171200][T10356] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.178333][T10356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.199011][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.207880][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.216965][T10359] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.224363][T10359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.242138][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.271798][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.282426][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.299840][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.312412][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.327999][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.337196][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.369586][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.382280][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.398802][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.409927][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.427227][T10728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.447257][T10730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.488354][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.500726][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.515048][T10730] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.525179][T10728] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 290.542643][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.558959][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.570552][T10356] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.577731][T10356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.612530][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.621055][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.639174][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.651698][ T3647] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.658835][ T3647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.674816][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.690747][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.775408][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.792006][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.802522][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.813089][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.822551][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.831539][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.841381][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.850381][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.863286][T10730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.875804][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.906832][T10730] 8021q: adding VLAN 0 to HW filter on device batadv0 18:09:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:09:13 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:09:13 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1a", 0xe, 0x400}], 0x0, 0x0) 18:09:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:13 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) [ 291.360370][T10752] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:13 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1a", 0xe, 0x400}], 0x0, 0x0) 18:09:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) [ 291.606491][T10763] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:13 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c9", 0x10, 0x400}], 0x0, 0x0) 18:09:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) [ 291.908121][T10771] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:14 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:09:14 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c9", 0x10, 0x400}], 0x0, 0x0) 18:09:14 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 292.621161][T10783] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 293.485308][T10790] IPVS: ftp: loaded support on port[0] = 21 [ 293.570522][T10790] chnl_net:caif_netlink_parms(): no params data found [ 293.631234][T10790] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.640099][T10790] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.648188][T10790] device bridge_slave_0 entered promiscuous mode [ 293.656717][T10790] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.665052][T10790] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.672764][T10790] device bridge_slave_1 entered promiscuous mode [ 293.695451][T10790] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 293.706434][T10790] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 293.726950][T10790] team0: Port device team_slave_0 added [ 293.735258][T10790] team0: Port device team_slave_1 added [ 293.796986][T10790] device hsr_slave_0 entered promiscuous mode [ 293.847391][T10790] device hsr_slave_1 entered promiscuous mode [ 294.279282][T10790] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.286445][T10790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.293907][T10790] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.301033][T10790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.526517][T10793] IPVS: ftp: loaded support on port[0] = 21 [ 294.559712][T10356] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.569474][T10356] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.594375][T10790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.805200][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.812990][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.825156][T10790] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.042125][T10793] chnl_net:caif_netlink_parms(): no params data found [ 295.053233][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.062921][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.071424][T10356] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.078550][T10356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.105659][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.114858][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.123175][ T3647] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.130303][ T3647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.138782][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.147742][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.364430][T10793] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.371642][T10793] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.380212][T10793] device bridge_slave_0 entered promiscuous mode [ 295.570846][T10793] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.578366][T10793] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.586553][T10793] device bridge_slave_1 entered promiscuous mode [ 295.598939][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.608466][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.617155][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.827498][T10793] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 295.839471][T10793] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 295.850867][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.860317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.869818][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.878294][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.891299][T10790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.904756][T10790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.101197][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.109874][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.120920][T10793] team0: Port device team_slave_0 added [ 296.131435][T10793] team0: Port device team_slave_1 added [ 296.387320][T10793] device hsr_slave_0 entered promiscuous mode [ 296.444338][T10793] device hsr_slave_1 entered promiscuous mode [ 296.502927][ T31] device bridge_slave_1 left promiscuous mode [ 296.510298][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.554621][ T31] device bridge_slave_0 left promiscuous mode [ 296.560826][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.606970][ T31] device bridge_slave_1 left promiscuous mode [ 296.613193][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.654692][ T31] device bridge_slave_0 left promiscuous mode [ 296.660883][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.705209][ T31] device bridge_slave_1 left promiscuous mode [ 296.711397][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.775027][ T31] device bridge_slave_0 left promiscuous mode [ 296.781242][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.655823][ T31] device hsr_slave_1 left promiscuous mode [ 301.729368][ T31] device hsr_slave_0 left promiscuous mode [ 301.797366][ T31] team0 (unregistering): Port device team_slave_1 removed [ 301.811649][ T31] team0 (unregistering): Port device team_slave_0 removed [ 301.823973][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 301.851888][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 301.951734][ T31] bond0 (unregistering): Released all slaves [ 302.097508][ T31] device hsr_slave_1 left promiscuous mode [ 302.149718][ T31] device hsr_slave_0 left promiscuous mode [ 302.206914][ T31] team0 (unregistering): Port device team_slave_1 removed [ 302.220256][ T31] team0 (unregistering): Port device team_slave_0 removed [ 302.231639][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 302.270722][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 302.351792][ T31] bond0 (unregistering): Released all slaves [ 302.517114][ T31] device hsr_slave_1 left promiscuous mode [ 302.559724][ T31] device hsr_slave_0 left promiscuous mode [ 302.626954][ T31] team0 (unregistering): Port device team_slave_1 removed [ 302.638640][ T31] team0 (unregistering): Port device team_slave_0 removed [ 302.652135][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 302.719953][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 302.793594][ T31] bond0 (unregistering): Released all slaves [ 302.940904][T10790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 303.063030][T10793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.091089][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.099768][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 18:09:25 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:25 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:09:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) 18:09:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 303.111192][T10793] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.130282][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.140356][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.149105][T10356] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.156245][T10356] bridge0: port 1(bridge_slave_0) entered forwarding state 18:09:25 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c9", 0x10, 0x400}], 0x0, 0x0) [ 303.187337][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.205310][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.252916][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.295653][T10356] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.302802][T10356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.333869][T10808] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000040)={0x0, 0x100000}) dup2(r0, r1) [ 303.351527][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.386932][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.414737][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 303.441645][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:09:25 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f", 0x11, 0x400}], 0x0, 0x0) 18:09:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) dup2(r0, r1) [ 303.728860][T10818] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:25 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f", 0x11, 0x400}], 0x0, 0x0) 18:09:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) dup2(r0, r1) [ 304.023825][T10827] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:26 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f", 0x11, 0x400}], 0x0, 0x0) [ 304.329895][T10835] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 304.471298][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.490966][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.502411][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.549230][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.566733][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.611257][T10793] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 304.649455][T10793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.658714][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.674640][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.838914][T10793] 8021q: adding VLAN 0 to HW filter on device batadv0 18:09:26 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12}], 0x0, 0x0) 18:09:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) dup2(r0, r1) 18:09:26 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:09:26 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 305.028623][T10854] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 305.722917][T10866] IPVS: ftp: loaded support on port[0] = 21 [ 305.892076][T10866] chnl_net:caif_netlink_parms(): no params data found [ 305.969333][T10866] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.978527][T10866] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.991106][T10866] device bridge_slave_0 entered promiscuous mode [ 306.003533][T10866] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.017936][T10866] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.028831][T10866] device bridge_slave_1 entered promiscuous mode [ 306.067618][T10866] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 306.087459][T10866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 306.123175][T10866] team0: Port device team_slave_0 added [ 306.131825][T10866] team0: Port device team_slave_1 added [ 306.197243][T10866] device hsr_slave_0 entered promiscuous mode [ 306.244738][T10866] device hsr_slave_1 entered promiscuous mode [ 306.298253][T10866] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.305420][T10866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.312913][T10866] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.320064][T10866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.373381][T10866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.390423][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.400463][ T9609] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.411932][ T9609] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.436101][T10866] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.449325][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.459057][ T9609] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.466204][ T9609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.485367][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.495287][ T9609] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.502364][ T9609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.529528][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 306.540104][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 306.566530][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.580130][T10866] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 306.592010][T10866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 306.600644][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 306.609643][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 306.618608][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.641369][T10866] 8021q: adding VLAN 0 to HW filter on device batadv0 18:09:28 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:28 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12}], 0x0, 0x0) 18:09:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)) dup2(r0, r1) 18:09:28 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:28 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 306.991931][T10881] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)) dup2(0xffffffffffffffff, r1) 18:09:29 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:29 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000000)="604884e002000a00900cda40ff1ad5c98f13", 0x12}], 0x0, 0x0) [ 307.380615][T10892] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 18:09:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)) dup2(0xffffffffffffffff, r1) 18:09:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)) dup2(0xffffffffffffffff, r1) 18:09:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003100)=[{0x0, 0xe8030000fffffdef, 0x0}], 0x1, 0x48800) 18:09:30 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 309.177878][T10916] IPVS: ftp: loaded support on port[0] = 21 [ 309.416192][T10916] chnl_net:caif_netlink_parms(): no params data found [ 309.614826][T10916] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.622010][T10916] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.629900][T10916] device bridge_slave_0 entered promiscuous mode [ 309.638517][T10916] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.645763][T10916] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.653429][T10916] device bridge_slave_1 entered promiscuous mode [ 309.848827][T10916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 309.858944][T10916] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 309.884519][T10916] team0: Port device team_slave_0 added [ 309.892260][T10916] team0: Port device team_slave_1 added [ 310.117788][T10916] device hsr_slave_0 entered promiscuous mode [ 310.174337][T10916] device hsr_slave_1 entered promiscuous mode [ 310.401370][T10916] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.408490][T10916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.415937][T10916] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.423020][T10916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.625377][T10733] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.633392][T10733] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.841666][T10916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.853350][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.861437][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.873243][T10916] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.885996][ T31] device bridge_slave_1 left promiscuous mode [ 310.892258][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.945037][ T31] device bridge_slave_0 left promiscuous mode [ 310.951258][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.005777][ T31] device bridge_slave_1 left promiscuous mode [ 311.011985][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.054597][ T31] device bridge_slave_0 left promiscuous mode [ 311.060785][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.115448][ T31] device bridge_slave_1 left promiscuous mode [ 311.121658][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.184694][ T31] device bridge_slave_0 left promiscuous mode [ 311.190883][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.876927][ T31] device hsr_slave_1 left promiscuous mode [ 315.927485][ T31] device hsr_slave_0 left promiscuous mode [ 315.987618][ T31] team0 (unregistering): Port device team_slave_1 removed [ 316.002307][ T31] team0 (unregistering): Port device team_slave_0 removed [ 316.013950][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 316.067909][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 316.161541][ T31] bond0 (unregistering): Released all slaves [ 316.326686][ T31] device hsr_slave_1 left promiscuous mode [ 316.409495][ T31] device hsr_slave_0 left promiscuous mode [ 316.450890][ T31] team0 (unregistering): Port device team_slave_1 removed [ 316.462472][ T31] team0 (unregistering): Port device team_slave_0 removed [ 316.473699][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 316.530453][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 316.602859][ T31] bond0 (unregistering): Released all slaves [ 316.747352][ T31] device hsr_slave_1 left promiscuous mode [ 316.789615][ T31] device hsr_slave_0 left promiscuous mode [ 316.849377][ T31] team0 (unregistering): Port device team_slave_1 removed [ 316.860994][ T31] team0 (unregistering): Port device team_slave_0 removed [ 316.873224][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 316.931303][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 317.022923][ T31] bond0 (unregistering): Released all slaves [ 317.115041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.127554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.135950][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.143003][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.151097][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.159714][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.168205][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.175310][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.184862][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 317.202976][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 317.213963][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 317.222764][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 317.232698][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 317.242882][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 317.252659][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 317.266794][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 317.275803][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.289039][T10916] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 317.300770][T10916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.308977][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 317.317697][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.340783][T10916] 8021q: adding VLAN 0 to HW filter on device batadv0 18:09:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:09:39 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x2000000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 18:09:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)) dup2(r0, 0xffffffffffffffff) 18:09:39 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:39 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)) dup2(r0, 0xffffffffffffffff) 18:09:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000100)={0x0, 0xffff}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000380)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:09:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)) dup2(r0, 0xffffffffffffffff) 18:09:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000280)=0x1) 18:09:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:40 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:09:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:09:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup(r0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xfff) 18:09:41 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) [ 319.761927][T10971] IPVS: ftp: loaded support on port[0] = 21 [ 319.991327][T10971] chnl_net:caif_netlink_parms(): no params data found [ 320.062955][T10971] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.083159][T10971] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.091901][T10971] device bridge_slave_0 entered promiscuous mode [ 320.105923][T10971] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.113123][T10971] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.127509][T10971] device bridge_slave_1 entered promiscuous mode [ 320.160811][T10971] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 320.178221][T10971] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 320.207076][T10971] team0: Port device team_slave_0 added [ 320.215339][T10971] team0: Port device team_slave_1 added [ 320.286984][T10971] device hsr_slave_0 entered promiscuous mode [ 320.324254][T10971] device hsr_slave_1 entered promiscuous mode [ 320.418329][T10971] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.425600][T10971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.433005][T10971] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.440208][T10971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.510432][T10971] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.531348][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.540418][T10733] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.548627][T10733] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.569657][T10971] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.580798][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.582349][T10975] IPVS: ftp: loaded support on port[0] = 21 [ 320.595585][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.604492][ T3647] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.611671][ T3647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.635675][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.645368][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.654177][T10359] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.661262][T10359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.671971][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.695213][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.726233][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.736124][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.745012][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.755049][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.763705][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.772923][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.790284][T10971] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.802719][T10971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.819454][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.828052][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.841617][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.886011][T10971] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.002556][T10975] chnl_net:caif_netlink_parms(): no params data found [ 321.052156][T10982] IPVS: ftp: loaded support on port[0] = 21 [ 321.148127][T10975] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.156368][T10975] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.165610][T10975] device bridge_slave_0 entered promiscuous mode [ 321.188915][T10975] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.211518][T10975] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.225306][T10975] device bridge_slave_1 entered promiscuous mode [ 321.302994][T10975] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 321.328047][T10975] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 321.381288][T10975] team0: Port device team_slave_0 added [ 321.390280][T10975] team0: Port device team_slave_1 added [ 321.502505][T10982] chnl_net:caif_netlink_parms(): no params data found [ 321.561970][T10975] device hsr_slave_0 entered promiscuous mode [ 321.626214][T10975] device hsr_slave_1 entered promiscuous mode [ 321.741638][T10982] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.751132][T10982] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.759795][T10982] device bridge_slave_0 entered promiscuous mode [ 321.771969][T10982] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.779599][T10982] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.792058][T10982] device bridge_slave_1 entered promiscuous mode [ 322.054959][T10982] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 322.075041][T10982] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 322.238333][T10982] team0: Port device team_slave_0 added [ 322.247580][T10975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.262687][T10982] team0: Port device team_slave_1 added [ 322.274146][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.282774][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.420975][T10975] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.476937][T10982] device hsr_slave_0 entered promiscuous mode [ 322.524578][T10982] device hsr_slave_1 entered promiscuous mode [ 322.569914][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.578896][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.587449][T10356] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.594566][T10356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.602482][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.743492][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.752320][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.760948][T10733] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.768067][T10733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.776296][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 322.785682][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 322.802937][T10975] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 322.814372][T10975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 322.834565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 322.843415][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.852497][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 322.862074][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.870901][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.879861][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.888792][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.897264][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.907357][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.915408][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 323.075423][T10975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 323.236954][T10982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.251886][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.261597][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 18:09:45 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:45 executing program 0: 18:09:45 executing program 2: syz_open_procfs(0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() faccessat(0xffffffffffffffff, 0x0, 0x1, 0x1200) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000044000)) sched_getaffinity(r0, 0x918cb3d8ea252c50, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) 18:09:45 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:09:45 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 323.500241][T10982] 8021q: adding VLAN 0 to HW filter on device team0 18:09:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000440)="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", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), 0x0}, 0x20) 18:09:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") sendmmsg$alg(r1, &(0x7f0000003100)=[{0x0, 0xe803000000000000, 0x0}], 0x500, 0xe803) accept(r1, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) [ 324.410226][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.421481][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.442167][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.450410][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.468495][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.499253][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.508019][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.515140][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.524757][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.535034][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.543053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.712314][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.722104][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.730960][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.741139][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.750616][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 324.767467][ T31] device bridge_slave_1 left promiscuous mode [ 324.773716][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.805169][ T31] device bridge_slave_0 left promiscuous mode [ 324.811481][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.845986][ T31] device bridge_slave_1 left promiscuous mode [ 324.852197][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.894669][ T31] device bridge_slave_0 left promiscuous mode [ 324.900837][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.116584][ T31] device hsr_slave_1 left promiscuous mode [ 328.159430][ T31] device hsr_slave_0 left promiscuous mode [ 328.216933][ T31] team0 (unregistering): Port device team_slave_1 removed [ 328.230432][ T31] team0 (unregistering): Port device team_slave_0 removed [ 328.242858][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 328.307850][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 328.401383][ T31] bond0 (unregistering): Released all slaves [ 328.558028][ T31] device hsr_slave_1 left promiscuous mode [ 328.607242][ T31] device hsr_slave_0 left promiscuous mode [ 328.660223][ T31] team0 (unregistering): Port device team_slave_1 removed [ 328.671825][ T31] team0 (unregistering): Port device team_slave_0 removed [ 328.683300][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 328.721819][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 328.812274][ T31] bond0 (unregistering): Released all slaves [ 328.923925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 328.932355][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.944978][T10982] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 328.959602][T10982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 328.967578][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 328.976881][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.994564][T11016] IPVS: ftp: loaded support on port[0] = 21 [ 329.001251][T10982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 329.160628][T11016] chnl_net:caif_netlink_parms(): no params data found [ 329.192350][T11016] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.199693][T11016] bridge0: port 1(bridge_slave_0) entered disabled state 18:09:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:51 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x18, 0x0, 0x2, &(0x7f0000000080)) ioctl(r0, 0x81000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 18:09:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:09:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x101) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000000400), 0x4000000000000fc, 0x0) 18:09:51 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 329.207866][T11016] device bridge_slave_0 entered promiscuous mode [ 329.295348][T11016] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.302473][T11016] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.319597][ T24] audit: type=1400 audit(1560017391.322:60): avc: denied { name_bind } for pid=11029 comm="syz-executor.2" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 329.371915][T11016] device bridge_slave_1 entered promiscuous mode [ 329.392816][ T24] audit: type=1400 audit(1560017391.352:61): avc: denied { node_bind } for pid=11029 comm="syz-executor.2" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 329.461304][ T24] audit: type=1400 audit(1560017391.352:62): avc: denied { name_connect } for pid=11029 comm="syz-executor.2" dest=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:09:51 executing program 0: 18:09:51 executing program 0: 18:09:51 executing program 0: 18:09:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 330.376702][T11016] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 330.427690][T11016] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 330.507321][T11016] team0: Port device team_slave_0 added [ 330.522031][T11016] team0: Port device team_slave_1 added [ 330.627064][T11016] device hsr_slave_0 entered promiscuous mode [ 330.664264][T11016] device hsr_slave_1 entered promiscuous mode [ 330.840821][T11016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.915979][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 330.936066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 330.944699][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 330.955908][T11016] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.969090][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 330.977936][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 330.986871][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.994013][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.013952][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 331.022066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.032103][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.041843][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.048983][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.058332][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.067335][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.086143][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.095305][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.112057][T11016] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 331.132192][T11016] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 331.151337][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 331.160091][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.178864][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.204047][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.221031][T11016] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 331.334681][T11054] IPVS: ftp: loaded support on port[0] = 21 [ 331.479129][T11054] chnl_net:caif_netlink_parms(): no params data found 18:09:53 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:53 executing program 0: 18:09:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x101) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000000400), 0x4000000000000fc, 0x0) 18:09:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:09:53 executing program 0: [ 331.664755][T11054] bridge0: port 1(bridge_slave_0) entered blocking state 18:09:53 executing program 2: [ 331.732997][T11054] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.777962][T11054] device bridge_slave_0 entered promiscuous mode [ 331.816740][T11054] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.852430][T11054] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.890733][T11054] device bridge_slave_1 entered promiscuous mode [ 332.036007][T11054] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 332.100118][T11054] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 332.223095][T11054] team0: Port device team_slave_0 added [ 332.263001][T11054] team0: Port device team_slave_1 added [ 332.386913][T11054] device hsr_slave_0 entered promiscuous mode [ 332.424138][T11054] device hsr_slave_1 entered promiscuous mode [ 332.596918][T11054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.611523][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.620624][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.632254][T11054] 8021q: adding VLAN 0 to HW filter on device team0 [ 332.647458][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.657996][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.667751][T10359] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.674889][T10359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.695607][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.703581][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.712516][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.721509][T10356] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.728635][T10356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.738662][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 332.747385][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 332.756325][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.765223][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.774255][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.786140][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.796996][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.813834][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.822323][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.830829][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.840978][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.851081][T11054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.872628][T11054] 8021q: adding VLAN 0 to HW filter on device batadv0 18:09:55 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:09:55 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast1, @local, 0x0, 0x1, [@empty]}, 0x14) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x409, &(0x7f00000000c0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 18:09:55 executing program 2: ioctl(0xffffffffffffffff, 0x8, &(0x7f00000000c0)="11dc86055e0bceec7be070") socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xa}, [@typed={0x8, 0x15, @u32}, @typed={0x8, 0x8, @pid}]}, 0x24}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xff, 0x0, &(0x7f0000000200)) 18:09:55 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:55 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 333.060718][ T24] audit: type=1400 audit(1560017395.062:63): avc: denied { write } for pid=11086 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 18:09:55 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:55 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:09:55 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) [ 334.161329][T11107] IPVS: ftp: loaded support on port[0] = 21 [ 334.630476][T11107] chnl_net:caif_netlink_parms(): no params data found [ 334.777905][T11107] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.785195][T11107] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.792927][T11107] device bridge_slave_0 entered promiscuous mode [ 334.801996][T11107] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.809175][T11107] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.817487][T11107] device bridge_slave_1 entered promiscuous mode [ 334.971159][T11107] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 334.981968][T11107] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 335.007822][T11107] team0: Port device team_slave_0 added [ 335.015202][T11107] team0: Port device team_slave_1 added [ 335.217114][T11107] device hsr_slave_0 entered promiscuous mode [ 335.264283][T11107] device hsr_slave_1 entered promiscuous mode [ 335.593526][T11107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.608554][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.616459][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.746909][T11107] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.756827][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.766530][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.780693][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.787900][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.796715][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 335.807333][ T31] device bridge_slave_1 left promiscuous mode [ 335.813606][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.844781][ T31] device bridge_slave_0 left promiscuous mode [ 335.850982][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.895891][ T31] device bridge_slave_1 left promiscuous mode [ 335.902097][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.935532][ T31] device bridge_slave_0 left promiscuous mode [ 335.941742][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.207010][ T31] device hsr_slave_1 left promiscuous mode [ 339.247260][ T31] device hsr_slave_0 left promiscuous mode [ 339.301123][ T31] team0 (unregistering): Port device team_slave_1 removed [ 339.313002][ T31] team0 (unregistering): Port device team_slave_0 removed [ 339.325438][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 339.381152][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 339.480394][ T31] bond0 (unregistering): Released all slaves [ 339.626163][ T31] device hsr_slave_1 left promiscuous mode [ 339.680525][ T31] device hsr_slave_0 left promiscuous mode [ 339.719798][ T31] team0 (unregistering): Port device team_slave_1 removed [ 339.731663][ T31] team0 (unregistering): Port device team_slave_0 removed [ 339.743344][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 339.799180][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 339.881311][ T31] bond0 (unregistering): Released all slaves [ 339.968454][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.978424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.988299][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.995427][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.014086][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 340.022682][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 340.031371][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 340.039975][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 340.048933][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 340.062346][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 340.073566][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 340.090338][T11107] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 340.102181][T11107] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 340.116241][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 340.124935][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.133315][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 340.142259][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.151478][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 340.173987][T11107] 8021q: adding VLAN 0 to HW filter on device batadv0 18:10:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:02 executing program 0: symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_read_part_table(0x0, 0x0, 0x0) 18:10:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000380)={"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"}) 18:10:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:02 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:10:02 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:02 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:02 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:02 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:04 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:04 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 342.725841][T11144] IPVS: ftp: loaded support on port[0] = 21 [ 343.022251][T11144] chnl_net:caif_netlink_parms(): no params data found [ 343.155632][T11144] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.162818][T11144] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.171467][T11144] device bridge_slave_0 entered promiscuous mode [ 343.180536][T11144] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.189471][T11144] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.198876][T11144] device bridge_slave_1 entered promiscuous mode [ 343.240336][T11144] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 343.253544][T11144] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 343.277941][T11151] IPVS: ftp: loaded support on port[0] = 21 [ 343.305368][T11144] team0: Port device team_slave_0 added [ 343.318535][T11144] team0: Port device team_slave_1 added [ 343.397026][T11144] device hsr_slave_0 entered promiscuous mode [ 343.434308][T11144] device hsr_slave_1 entered promiscuous mode [ 343.522417][T11144] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.529589][T11144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.537334][T11144] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.544483][T11144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.665312][T11151] chnl_net:caif_netlink_parms(): no params data found [ 343.739044][T11144] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.774121][ T9609] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.789710][ T9609] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.814634][T11151] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.821751][T11151] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.830285][T11151] device bridge_slave_0 entered promiscuous mode [ 343.852176][T11151] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.859557][T11151] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.871077][T11151] device bridge_slave_1 entered promiscuous mode [ 343.881009][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 343.890284][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.901987][T11144] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.930738][T11154] IPVS: ftp: loaded support on port[0] = 21 [ 343.942652][T11151] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 343.953995][T11151] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 343.993532][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.002635][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.011768][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.018915][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.027299][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.036134][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.044660][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.051723][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.061327][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.088107][T11151] team0: Port device team_slave_0 added [ 344.102040][T11151] team0: Port device team_slave_1 added [ 344.121370][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 344.142908][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 344.151913][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 344.760197][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 344.768468][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 344.777230][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 344.845786][T11151] device hsr_slave_0 entered promiscuous mode [ 344.894354][T11151] device hsr_slave_1 entered promiscuous mode [ 345.259237][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.268320][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.276874][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.285537][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.297968][T11144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.669350][T11154] chnl_net:caif_netlink_parms(): no params data found [ 345.720770][T11154] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.729380][T11154] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.737952][T11154] device bridge_slave_0 entered promiscuous mode [ 345.748135][T11154] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.756243][T11154] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.764164][T11154] device bridge_slave_1 entered promiscuous mode [ 345.789097][T11154] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 346.109285][T11154] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 346.131453][T11144] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 346.162425][T11154] team0: Port device team_slave_0 added [ 346.500774][T11154] team0: Port device team_slave_1 added [ 346.907006][T11154] device hsr_slave_0 entered promiscuous mode [ 346.962628][T11154] device hsr_slave_1 entered promiscuous mode [ 347.027942][T11151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 347.384356][T11151] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.567688][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.575536][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.912835][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.922242][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.930849][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.937993][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.945887][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 347.954696][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.963637][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.970907][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.978826][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 347.997456][T11154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.341889][ T9609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 348.355105][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 348.375065][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 348.383815][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.392280][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 348.401824][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.410809][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.419314][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.428250][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 348.440806][T11151] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 348.452719][T11151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.464286][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 348.472809][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.481953][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.490024][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.500890][ T31] device bridge_slave_1 left promiscuous mode [ 348.508455][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.535404][ T31] device bridge_slave_0 left promiscuous mode [ 348.541686][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.596159][ T31] device bridge_slave_1 left promiscuous mode [ 348.602363][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.667463][ T31] device bridge_slave_0 left promiscuous mode [ 348.673683][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.726847][ T31] device bridge_slave_1 left promiscuous mode [ 348.733047][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.775091][ T31] device bridge_slave_0 left promiscuous mode [ 348.781344][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.835200][ T31] device bridge_slave_1 left promiscuous mode [ 348.841388][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.895003][ T31] device bridge_slave_0 left promiscuous mode [ 348.901261][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.945453][ T31] device bridge_slave_1 left promiscuous mode [ 348.951636][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.004853][ T31] device bridge_slave_0 left promiscuous mode [ 349.011176][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.316288][ T31] device hsr_slave_1 left promiscuous mode [ 357.357573][ T31] device hsr_slave_0 left promiscuous mode [ 357.409797][ T31] team0 (unregistering): Port device team_slave_1 removed [ 357.421961][ T31] team0 (unregistering): Port device team_slave_0 removed [ 357.434584][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 357.490824][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 357.562911][ T31] bond0 (unregistering): Released all slaves [ 357.685929][ T31] device hsr_slave_1 left promiscuous mode [ 357.739434][ T31] device hsr_slave_0 left promiscuous mode [ 357.801056][ T31] team0 (unregistering): Port device team_slave_1 removed [ 357.812734][ T31] team0 (unregistering): Port device team_slave_0 removed [ 357.825967][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 357.890096][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 357.961793][ T31] bond0 (unregistering): Released all slaves [ 358.107417][ T31] device hsr_slave_1 left promiscuous mode [ 358.149705][ T31] device hsr_slave_0 left promiscuous mode [ 358.210656][ T31] team0 (unregistering): Port device team_slave_1 removed [ 358.222387][ T31] team0 (unregistering): Port device team_slave_0 removed [ 358.234147][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 358.282252][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 358.360596][ T31] bond0 (unregistering): Released all slaves [ 358.527193][ T31] device hsr_slave_1 left promiscuous mode [ 358.569703][ T31] device hsr_slave_0 left promiscuous mode [ 358.649102][ T31] team0 (unregistering): Port device team_slave_1 removed [ 358.660719][ T31] team0 (unregistering): Port device team_slave_0 removed [ 358.673525][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 358.710979][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 358.801808][ T31] bond0 (unregistering): Released all slaves [ 358.957512][ T31] device hsr_slave_1 left promiscuous mode [ 359.010320][ T31] device hsr_slave_0 left promiscuous mode [ 359.068956][ T31] team0 (unregistering): Port device team_slave_1 removed [ 359.080546][ T31] team0 (unregistering): Port device team_slave_0 removed [ 359.091836][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 359.130502][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 359.221941][ T31] bond0 (unregistering): Released all slaves [ 359.340456][T11154] 8021q: adding VLAN 0 to HW filter on device team0 [ 359.372952][T11151] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 359.389601][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 359.402710][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.411848][T10734] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.419080][T10734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.429112][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.437981][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.446736][T10734] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.453862][T10734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.462465][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.473636][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 359.503238][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 359.524810][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 359.533648][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 359.557790][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 359.567441][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 359.577467][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.586202][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.604606][T11154] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 359.617254][T11154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 359.637828][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 359.646204][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 18:10:21 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:21 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:10:21 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 359.655203][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.707711][T11154] 8021q: adding VLAN 0 to HW filter on device batadv0 18:10:21 executing program 5: r0 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:10:22 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:10:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:22 executing program 5: r0 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:10:22 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:10:22 executing program 5: r0 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r1, 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 18:10:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 361.522365][T11197] IPVS: ftp: loaded support on port[0] = 21 [ 361.606816][T11197] chnl_net:caif_netlink_parms(): no params data found [ 361.667083][T11197] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.680155][T11197] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.688784][T11197] device bridge_slave_0 entered promiscuous mode [ 361.703039][T11197] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.710700][T11197] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.724607][T11197] device bridge_slave_1 entered promiscuous mode [ 361.762011][T11197] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 361.779213][T11197] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 361.809728][T11197] team0: Port device team_slave_0 added [ 361.823144][T11197] team0: Port device team_slave_1 added [ 361.898060][T11197] device hsr_slave_0 entered promiscuous mode [ 361.974143][T11197] device hsr_slave_1 entered promiscuous mode [ 362.036666][T11201] IPVS: ftp: loaded support on port[0] = 21 [ 362.039821][T11197] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.049753][T11197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.057189][T11197] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.064309][T11197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.092744][T11202] IPVS: ftp: loaded support on port[0] = 21 [ 362.241721][T11197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.341729][T11201] chnl_net:caif_netlink_parms(): no params data found [ 362.410031][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.435188][T10356] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.443291][T10356] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.471806][T11197] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.516353][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.533111][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.542329][T10356] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.549496][T10356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.587954][T11202] chnl_net:caif_netlink_parms(): no params data found [ 362.611298][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.628818][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.643262][T10359] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.650460][T10359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.666512][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.680517][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.737762][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.747416][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.757139][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.766699][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.776051][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.784671][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.793627][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.802590][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.811163][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.820177][T11201] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.830285][T11201] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.838779][T11201] device bridge_slave_0 entered promiscuous mode [ 362.857973][T11206] IPVS: ftp: loaded support on port[0] = 21 [ 362.872323][T11202] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.881203][T11202] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.889289][T11202] device bridge_slave_0 entered promiscuous mode [ 362.897934][T11202] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.906081][T11202] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.914037][T11202] device bridge_slave_1 entered promiscuous mode [ 362.927965][T11201] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.936147][T11201] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.944109][T11201] device bridge_slave_1 entered promiscuous mode [ 362.952381][T11197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.989418][T11201] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 363.007240][T11201] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 363.025364][T11202] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 363.077655][T11202] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 363.097815][T11201] team0: Port device team_slave_0 added [ 363.112860][T11202] team0: Port device team_slave_0 added [ 363.135628][T11197] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 363.151785][T11201] team0: Port device team_slave_1 added [ 363.159009][T11202] team0: Port device team_slave_1 added [ 363.267132][T11201] device hsr_slave_0 entered promiscuous mode [ 363.284143][T11201] device hsr_slave_1 entered promiscuous mode [ 363.367023][T11202] device hsr_slave_0 entered promiscuous mode [ 363.404189][T11202] device hsr_slave_1 entered promiscuous mode [ 363.566491][T11202] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.573615][T11202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.581081][T11202] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.588241][T11202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.628544][T10356] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.641291][T10356] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.870206][T11206] chnl_net:caif_netlink_parms(): no params data found [ 364.228354][T11206] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.236326][T11206] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.244645][T11206] device bridge_slave_0 entered promiscuous mode [ 364.252687][T11206] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.259888][T11206] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.268116][T11206] device bridge_slave_1 entered promiscuous mode [ 364.295323][T11206] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 364.313262][T11201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 364.325474][T11206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 364.347046][T11202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 364.370525][T11201] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.390145][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.399258][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.407946][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.416867][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.425772][T10734] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.432941][T10734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.441304][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 364.455773][T11206] team0: Port device team_slave_0 added [ 364.463254][T11206] team0: Port device team_slave_1 added [ 364.484529][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.492768][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.500819][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 364.511474][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.520560][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.527708][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.576034][T11202] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.587293][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 364.597255][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 364.606488][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 364.615867][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 364.625157][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 364.676518][T11206] device hsr_slave_0 entered promiscuous mode [ 364.724890][T11206] device hsr_slave_1 entered promiscuous mode [ 364.772351][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.781193][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.790444][T10359] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.798366][T10359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.806853][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 364.816734][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 364.825857][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 364.834947][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.843288][T10359] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.850445][T10359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.858319][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 364.866960][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.875435][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 364.888447][T11201] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 364.900199][T11201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 364.924508][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 364.933318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.953836][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 364.962649][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 364.971862][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 364.980475][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 364.989308][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 364.998027][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 365.006574][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 365.015649][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 365.035786][T11202] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 365.047369][T11202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 365.061028][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 365.070970][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 365.587188][T11201] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 365.891065][T11206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 365.917625][T11202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 365.932949][T11206] 8021q: adding VLAN 0 to HW filter on device team0 [ 366.202893][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 366.211241][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 366.577366][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 366.586376][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 366.595100][ T3647] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.602243][ T3647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.610658][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 366.619285][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 366.627923][ T3647] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.635205][ T3647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.642996][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 18:10:28 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$PIO_CMAP(r0, 0x4b71, 0x0) 18:10:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:28 executing program 0: 18:10:28 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:28 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 367.084455][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 367.092916][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 367.133281][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 367.160338][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:10:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 367.179258][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 367.198326][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 367.218457][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 18:10:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:29 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:29 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 368.072340][T11206] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 368.092817][T11206] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 368.668879][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 368.677585][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.686310][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 368.694700][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.703597][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 369.080299][T11206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 369.121975][T11244] IPVS: ftp: loaded support on port[0] = 21 [ 369.442897][T11247] IPVS: ftp: loaded support on port[0] = 21 [ 369.466120][T11249] IPVS: ftp: loaded support on port[0] = 21 [ 369.839202][ T31] device bridge_slave_1 left promiscuous mode [ 369.846071][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.876593][ T31] device bridge_slave_0 left promiscuous mode [ 369.882792][ T31] bridge0: port 1(bridge_slave_0) entered disabled state 18:10:31 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:10:31 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:31 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, 0x0) fchown(r0, r1, 0x0) [ 369.926153][ T31] device bridge_slave_1 left promiscuous mode [ 369.932393][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.998566][ T31] device bridge_slave_0 left promiscuous mode [ 370.014728][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.055992][ T31] device bridge_slave_1 left promiscuous mode [ 370.062261][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.124766][ T31] device bridge_slave_0 left promiscuous mode [ 370.130999][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.185639][ T31] device bridge_slave_1 left promiscuous mode [ 370.191897][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.236228][ T31] device bridge_slave_0 left promiscuous mode [ 370.242501][ T31] bridge0: port 1(bridge_slave_0) entered disabled state 18:10:32 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 377.036643][ T31] device hsr_slave_1 left promiscuous mode [ 377.097670][ T31] device hsr_slave_0 left promiscuous mode [ 377.137715][ T31] team0 (unregistering): Port device team_slave_1 removed [ 377.152068][ T31] team0 (unregistering): Port device team_slave_0 removed [ 377.164041][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 377.221299][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 377.311625][ T31] bond0 (unregistering): Released all slaves [ 377.447076][ T31] device hsr_slave_1 left promiscuous mode [ 377.518875][ T31] device hsr_slave_0 left promiscuous mode [ 377.569896][ T31] team0 (unregistering): Port device team_slave_1 removed [ 377.582013][ T31] team0 (unregistering): Port device team_slave_0 removed [ 377.594719][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 377.667575][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 377.762251][ T31] bond0 (unregistering): Released all slaves [ 377.917346][ T31] device hsr_slave_1 left promiscuous mode [ 377.957951][ T31] device hsr_slave_0 left promiscuous mode [ 378.017684][ T31] team0 (unregistering): Port device team_slave_1 removed [ 378.031666][ T31] team0 (unregistering): Port device team_slave_0 removed [ 378.042975][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 378.090878][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 378.173382][ T31] bond0 (unregistering): Released all slaves [ 378.317392][ T31] device hsr_slave_1 left promiscuous mode [ 378.359774][ T31] device hsr_slave_0 left promiscuous mode [ 378.427375][ T31] team0 (unregistering): Port device team_slave_1 removed [ 378.441156][ T31] team0 (unregistering): Port device team_slave_0 removed [ 378.452701][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 378.478279][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 378.572354][ T31] bond0 (unregistering): Released all slaves [ 378.867527][T11265] IPVS: ftp: loaded support on port[0] = 21 [ 378.908565][T11244] chnl_net:caif_netlink_parms(): no params data found [ 379.011842][T11244] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.019661][T11244] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.034606][T11244] device bridge_slave_0 entered promiscuous mode [ 379.067185][T11244] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.074652][T11244] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.082545][T11244] device bridge_slave_1 entered promiscuous mode [ 379.135743][T11244] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 379.150731][T11247] chnl_net:caif_netlink_parms(): no params data found [ 379.167325][T11244] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 379.208768][T11244] team0: Port device team_slave_0 added [ 379.236087][T11244] team0: Port device team_slave_1 added [ 379.308573][T11247] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.316244][T11247] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.324426][T11247] device bridge_slave_0 entered promiscuous mode [ 379.427090][T11244] device hsr_slave_0 entered promiscuous mode [ 379.484251][T11244] device hsr_slave_1 entered promiscuous mode [ 379.537615][T11247] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.548769][T11247] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.556687][T11247] device bridge_slave_1 entered promiscuous mode [ 379.580341][T11249] chnl_net:caif_netlink_parms(): no params data found [ 379.617911][T11247] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 379.645346][T11247] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 379.662034][T11265] chnl_net:caif_netlink_parms(): no params data found [ 379.689451][T11244] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.696618][T11244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.704166][T11244] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.711248][T11244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.739869][T11247] team0: Port device team_slave_0 added [ 379.749049][T11247] team0: Port device team_slave_1 added [ 379.763296][T11249] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.771042][T11249] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.779765][T11249] device bridge_slave_0 entered promiscuous mode [ 379.806152][T10734] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.815074][T10734] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.836588][T11249] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.847214][T11249] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.855768][T11249] device bridge_slave_1 entered promiscuous mode [ 379.937159][T11247] device hsr_slave_0 entered promiscuous mode [ 379.974319][T11247] device hsr_slave_1 entered promiscuous mode [ 380.024100][T11265] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.031256][T11265] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.040061][T11265] device bridge_slave_0 entered promiscuous mode [ 380.048235][T11265] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.056409][T11265] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.065799][T11265] device bridge_slave_1 entered promiscuous mode [ 380.099030][T11249] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 380.113389][T11249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 380.125300][T11265] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 380.135988][T11265] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 380.178407][T11249] team0: Port device team_slave_0 added [ 380.192750][T11249] team0: Port device team_slave_1 added [ 380.205320][T11265] team0: Port device team_slave_0 added [ 380.222697][T11265] team0: Port device team_slave_1 added [ 380.233228][T11244] 8021q: adding VLAN 0 to HW filter on device bond0 [ 380.325646][T11249] device hsr_slave_0 entered promiscuous mode [ 380.384109][T11249] device hsr_slave_1 entered promiscuous mode [ 380.647102][T11265] device hsr_slave_0 entered promiscuous mode [ 380.684279][T11265] device hsr_slave_1 entered promiscuous mode [ 380.742591][T11244] 8021q: adding VLAN 0 to HW filter on device team0 [ 380.768594][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 380.785026][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 380.859591][T11247] 8021q: adding VLAN 0 to HW filter on device bond0 [ 380.869444][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 380.887425][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 380.901706][T10359] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.908894][T10359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.966505][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 380.984844][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.993448][T10359] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.000621][T10359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.017499][T10359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 381.048620][T11247] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.073397][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 381.082750][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 381.099560][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.110957][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 381.129119][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 381.143631][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 381.181032][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.204364][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.212817][T10734] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.220004][T10734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.229178][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 381.239145][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 381.254586][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 381.263135][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 381.284293][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.292461][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.302541][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 381.311571][T10734] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.318745][T10734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.328315][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 381.337310][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 381.346705][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 381.356121][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 381.372765][T11244] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 381.390910][T11244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 381.420309][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 381.447606][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 381.456926][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 381.465855][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 381.475452][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 381.499413][T11249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 381.543524][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 381.564480][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 381.578462][T11247] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 381.590644][T11247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 381.607430][T11265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 381.618551][T11244] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 381.633058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 381.654500][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 381.679245][T11249] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.690796][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 381.700716][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.733160][T11265] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.755300][T11247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 381.766389][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 381.782745][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.802941][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.823067][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.832546][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.839708][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.849329][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.858197][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 381.866731][T10733] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.880609][T10733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.895884][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.905573][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.915557][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.925059][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.932429][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.941642][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.976924][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.999558][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.009093][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.016671][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.058478][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 382.067167][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 382.077269][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 382.086316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 382.095458][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 382.136795][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 382.149807][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 18:10:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 382.177694][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 382.204988][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup(0xffffffffffffffff) ioctl$TCSETAF(r0, 0x5408, 0x0) 18:10:44 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:44 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 382.224688][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 382.233637][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 382.291858][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 382.309979][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 18:10:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 383.047518][T11265] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 383.078809][T11265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 383.126562][T11249] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 383.170501][T11249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 383.183218][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 383.199717][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 383.218310][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.227408][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 383.236314][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 383.245356][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 383.254347][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.262970][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 383.272036][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.281104][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 383.348486][T11265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 383.377556][T11249] 8021q: adding VLAN 0 to HW filter on device batadv0 18:10:45 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:45 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, 0x0, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) 18:10:45 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:10:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:10:45 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$unix(0x1, 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 18:10:45 executing program 0: 18:10:46 executing program 0: 18:10:46 executing program 2: 18:10:46 executing program 2: 18:10:46 executing program 0: [ 384.827909][T11338] IPVS: ftp: loaded support on port[0] = 21 [ 385.006423][T11338] chnl_net:caif_netlink_parms(): no params data found [ 385.046016][T11338] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.053315][T11338] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.061452][T11338] device bridge_slave_0 entered promiscuous mode [ 385.069632][T11338] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.076871][T11338] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.085166][T11338] device bridge_slave_1 entered promiscuous mode [ 385.105528][T11338] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 385.117062][T11338] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 385.133627][T11338] team0: Port device team_slave_0 added [ 385.141734][T11338] team0: Port device team_slave_1 added [ 385.197430][T11338] device hsr_slave_0 entered promiscuous mode [ 385.254336][T11338] device hsr_slave_1 entered promiscuous mode [ 386.002381][T11343] IPVS: ftp: loaded support on port[0] = 21 [ 387.062573][T11338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 387.428195][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 387.439795][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 387.450617][T11343] chnl_net:caif_netlink_parms(): no params data found [ 387.467796][T11338] 8021q: adding VLAN 0 to HW filter on device team0 [ 387.827561][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 387.838251][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 387.848188][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.856236][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.864622][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 387.878189][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 387.886933][T10733] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.894211][T10733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.903509][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.272098][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 388.283468][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 388.292538][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 388.302467][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 388.312718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 388.323421][T11343] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.331451][T11343] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.339581][T11343] device bridge_slave_0 entered promiscuous mode [ 388.683801][T11338] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 388.696607][T11338] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 388.709638][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 388.719920][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 388.729768][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 388.739682][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.749143][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 388.760179][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.770564][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 388.778854][T11343] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.786792][T11343] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.796360][T11343] device bridge_slave_1 entered promiscuous mode [ 389.148851][T11343] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 389.159981][T11343] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 389.190994][T11343] team0: Port device team_slave_0 added [ 389.202647][T11343] team0: Port device team_slave_1 added [ 389.211104][ T31] device bridge_slave_1 left promiscuous mode [ 389.218236][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.264738][ T31] device bridge_slave_0 left promiscuous mode [ 389.272361][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.306587][ T31] device bridge_slave_1 left promiscuous mode [ 389.313247][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.355429][ T31] device bridge_slave_0 left promiscuous mode [ 389.363076][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.416436][ T31] device bridge_slave_1 left promiscuous mode [ 389.423168][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.464798][ T31] device bridge_slave_0 left promiscuous mode [ 389.471366][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.545146][ T31] device bridge_slave_1 left promiscuous mode [ 389.552002][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.634755][ T31] device bridge_slave_0 left promiscuous mode [ 389.641838][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.695939][ T31] device bridge_slave_1 left promiscuous mode [ 389.703017][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.765053][ T31] device bridge_slave_0 left promiscuous mode [ 389.772244][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.426927][ T31] device hsr_slave_1 left promiscuous mode [ 398.470395][ T31] device hsr_slave_0 left promiscuous mode [ 398.529383][ T31] team0 (unregistering): Port device team_slave_1 removed [ 398.541169][ T31] team0 (unregistering): Port device team_slave_0 removed [ 398.552608][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 398.588401][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 398.681427][ T31] bond0 (unregistering): Released all slaves [ 398.816065][ T31] device hsr_slave_1 left promiscuous mode [ 398.869927][ T31] device hsr_slave_0 left promiscuous mode [ 398.936936][ T31] team0 (unregistering): Port device team_slave_1 removed [ 398.949042][ T31] team0 (unregistering): Port device team_slave_0 removed [ 398.962086][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 399.027966][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 399.128731][ T31] bond0 (unregistering): Released all slaves [ 399.277546][ T31] device hsr_slave_1 left promiscuous mode [ 399.329688][ T31] device hsr_slave_0 left promiscuous mode [ 399.386975][ T31] team0 (unregistering): Port device team_slave_1 removed [ 399.400555][ T31] team0 (unregistering): Port device team_slave_0 removed [ 399.412170][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 399.449020][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 399.530765][ T31] bond0 (unregistering): Released all slaves [ 399.657614][ T31] device hsr_slave_1 left promiscuous mode [ 399.719766][ T31] device hsr_slave_0 left promiscuous mode [ 399.759653][ T31] team0 (unregistering): Port device team_slave_1 removed [ 399.772565][ T31] team0 (unregistering): Port device team_slave_0 removed [ 399.784108][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 399.834401][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 399.904360][ T31] bond0 (unregistering): Released all slaves [ 400.047341][ T31] device hsr_slave_1 left promiscuous mode [ 400.087450][ T31] device hsr_slave_0 left promiscuous mode [ 400.139020][ T31] team0 (unregistering): Port device team_slave_1 removed [ 400.150697][ T31] team0 (unregistering): Port device team_slave_0 removed [ 400.163101][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 400.201584][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 400.301707][ T31] bond0 (unregistering): Released all slaves [ 400.445817][T11343] device hsr_slave_0 entered promiscuous mode [ 400.504120][T11343] device hsr_slave_1 entered promiscuous mode [ 400.581553][T11338] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 400.667045][T11343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 400.700957][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 400.710554][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.742783][T11343] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.754604][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 400.763453][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.773295][T11270] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.781085][T11270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.799505][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 400.809747][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 18:11:02 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:02 executing program 2: 18:11:02 executing program 0: 18:11:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:02 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 400.846693][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.856794][T11270] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.864282][T11270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.874922][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 400.930724][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 400.952852][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 400.987740][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 401.042795][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.570092][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 401.581998][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.592654][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 401.603117][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.613206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 401.626388][T11343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 401.666018][T11343] 8021q: adding VLAN 0 to HW filter on device batadv0 18:11:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:03 executing program 0: 18:11:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:03 executing program 2: 18:11:03 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:03 executing program 0: 18:11:04 executing program 2: 18:11:04 executing program 2: 18:11:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4000020032, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000c00)=[{0x0}, {&(0x7f00000010c0)=""/4096, 0x1000}], 0x2) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x7fffffff, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 18:11:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 18:11:04 executing program 2: ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f00000001c0)) ftruncate(0xffffffffffffffff, 0x7fff) r0 = socket$inet6(0xa, 0x400000000001, 0x6) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'batadv0\x00', 0x100000001}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) creat(0x0, 0x48) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0x8000fffffffe) sendfile(r4, r5, 0x0, 0xa5cc554) r6 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r6, 0x6, 0x11, &(0x7f0000000080)=0x1, 0x4) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r6, r7, 0x0, 0xfffffffd) connect$unix(r6, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 402.877026][T11395] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 402.963688][T11396] IPVS: ftp: loaded support on port[0] = 21 [ 403.231355][T11396] chnl_net:caif_netlink_parms(): no params data found [ 403.303053][T11396] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.310891][T11396] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.319217][T11396] device bridge_slave_0 entered promiscuous mode [ 403.327826][T11396] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.335245][T11396] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.343406][T11396] device bridge_slave_1 entered promiscuous mode [ 403.367184][T11396] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 403.378255][T11396] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 403.408691][T11396] team0: Port device team_slave_0 added [ 403.418797][T11396] team0: Port device team_slave_1 added [ 403.547075][T11396] device hsr_slave_0 entered promiscuous mode [ 403.604429][T11396] device hsr_slave_1 entered promiscuous mode [ 403.663453][T11396] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.671032][T11396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.678605][T11396] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.685947][T11396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.773059][T11396] 8021q: adding VLAN 0 to HW filter on device bond0 [ 403.799682][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.818979][T11270] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.830138][T11270] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.848168][T11396] 8021q: adding VLAN 0 to HW filter on device team0 [ 403.860415][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.869962][T11270] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.877572][T11270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.895372][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 403.908912][T11270] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.916874][T11270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.945525][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 403.956290][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 403.966809][T11270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 403.981274][T11396] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 403.999480][T11396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 404.012288][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 404.027542][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 404.064906][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.089976][T11404] IPVS: ftp: loaded support on port[0] = 21 [ 404.102255][T11396] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 404.278558][T11404] chnl_net:caif_netlink_parms(): no params data found [ 404.397324][T11404] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.417685][T11404] bridge0: port 1(bridge_slave_0) entered disabled state 18:11:06 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001540)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, 0x0) 18:11:06 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x1], 0x1f004}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="b8010000000f01c1f20f01df64640f07660fe94000b8010000000f01d90f353e0f232fb9f30800000f3266ba420066ed0f20d835200000000f22d8", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getpgrp(0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x0) 18:11:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:06 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 404.443323][T11404] device bridge_slave_0 entered promiscuous mode [ 404.501426][T11404] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.534052][T11404] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.544162][T11404] device bridge_slave_1 entered promiscuous mode [ 404.623567][T11404] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 405.323593][T11404] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 405.402652][T11404] team0: Port device team_slave_0 added [ 405.439987][T11404] team0: Port device team_slave_1 added [ 405.517232][T11404] device hsr_slave_0 entered promiscuous mode [ 405.584291][T11404] device hsr_slave_1 entered promiscuous mode [ 405.688564][T11404] 8021q: adding VLAN 0 to HW filter on device bond0 [ 405.702416][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 405.712491][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.728988][T11404] 8021q: adding VLAN 0 to HW filter on device team0 [ 405.740346][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 405.750169][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.759020][T11376] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.766450][T11376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.795772][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 405.805774][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 405.815252][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.824575][T11376] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.831800][T11376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.840359][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 405.850052][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 405.859862][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 405.882144][T11404] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 405.894676][T11404] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 405.911424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 405.920824][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 405.929985][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.939511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.948661][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 405.974780][T11404] 8021q: adding VLAN 0 to HW filter on device batadv0 18:11:08 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:08 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:08 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x1], 0x1f004}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="b8010000000f01c1f20f01df64640f07660fe94000b8010000000f01d90f353e0f232fb9f30800000f3266ba420066ed0f20d835200000000f22d8", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getpgrp(0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x0) 18:11:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:08 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:08 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:08 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:09 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x1], 0x1f004}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="b8010000000f01c1f20f01df64640f07660fe94000b8010000000f01d90f353e0f232fb9f30800000f3266ba420066ed0f20d835200000000f22d8", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getpgrp(0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x0) [ 407.960824][T11443] IPVS: ftp: loaded support on port[0] = 21 [ 408.472236][T11455] IPVS: ftp: loaded support on port[0] = 21 [ 409.158401][T11455] chnl_net:caif_netlink_parms(): no params data found [ 409.177081][T11443] chnl_net:caif_netlink_parms(): no params data found [ 409.423214][T11443] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.431366][T11443] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.441198][T11443] device bridge_slave_0 entered promiscuous mode [ 409.458795][T11443] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.467854][T11443] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.476477][T11443] device bridge_slave_1 entered promiscuous mode [ 409.484722][T11455] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.491984][T11455] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.501348][T11455] device bridge_slave_0 entered promiscuous mode [ 409.528627][T11443] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 409.724567][T11455] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.732224][T11455] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.741790][T11455] device bridge_slave_1 entered promiscuous mode [ 409.753289][T11443] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 409.982575][T11455] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 409.998253][T11455] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 410.015896][T11443] team0: Port device team_slave_0 added [ 410.031556][T11443] team0: Port device team_slave_1 added [ 410.056353][ T31] device bridge_slave_1 left promiscuous mode [ 410.064914][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.125155][ T31] device bridge_slave_0 left promiscuous mode [ 410.132435][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.178332][ T31] device bridge_slave_1 left promiscuous mode [ 410.185677][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.255076][ T31] device bridge_slave_0 left promiscuous mode [ 410.262014][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.325354][ T31] device bridge_slave_1 left promiscuous mode [ 410.332393][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.394978][ T31] device bridge_slave_0 left promiscuous mode [ 410.402077][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.466942][ T31] device hsr_slave_1 left promiscuous mode [ 415.519093][ T31] device hsr_slave_0 left promiscuous mode [ 415.559277][ T31] team0 (unregistering): Port device team_slave_1 removed [ 415.571490][ T31] team0 (unregistering): Port device team_slave_0 removed [ 415.586463][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 415.650452][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 415.731150][ T31] bond0 (unregistering): Released all slaves [ 415.905980][ T31] device hsr_slave_1 left promiscuous mode [ 415.961280][ T31] device hsr_slave_0 left promiscuous mode [ 416.020742][ T31] team0 (unregistering): Port device team_slave_1 removed [ 416.032452][ T31] team0 (unregistering): Port device team_slave_0 removed [ 416.044070][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 416.081696][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 416.171602][ T31] bond0 (unregistering): Released all slaves [ 416.377439][ T31] device hsr_slave_1 left promiscuous mode [ 416.419804][ T31] device hsr_slave_0 left promiscuous mode [ 416.487413][ T31] team0 (unregistering): Port device team_slave_1 removed [ 416.500870][ T31] team0 (unregistering): Port device team_slave_0 removed [ 416.513049][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 416.567975][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 416.660966][ T31] bond0 (unregistering): Released all slaves [ 416.797531][T11443] device hsr_slave_0 entered promiscuous mode [ 416.874123][T11443] device hsr_slave_1 entered promiscuous mode [ 416.950516][T11443] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.957667][T11443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.965070][T11443] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.972137][T11443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.981835][T11270] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.989823][T11270] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.001054][T11455] team0: Port device team_slave_0 added [ 417.008827][T11455] team0: Port device team_slave_1 added [ 417.097067][T11455] device hsr_slave_0 entered promiscuous mode [ 417.164046][T11455] device hsr_slave_1 entered promiscuous mode [ 417.247425][T11443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 417.265656][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 417.273447][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.285509][T11443] 8021q: adding VLAN 0 to HW filter on device team0 [ 417.308861][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 417.318859][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.327783][T11194] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.334916][T11194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.366795][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 417.375775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.384768][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.391930][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.401636][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 417.410791][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 417.419505][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 417.428173][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 417.447545][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 417.455583][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 417.464839][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 417.473149][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 417.482131][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.498331][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 417.508428][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.520961][T11455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 417.530752][T11443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 417.551101][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 417.559362][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.570401][T11455] 8021q: adding VLAN 0 to HW filter on device team0 [ 417.592595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 417.602199][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.610871][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.617966][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.626634][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 417.635702][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.644344][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.651509][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.672826][T11443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 417.680775][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 417.694399][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 417.718474][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 417.728538][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 417.737744][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 417.746786][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 417.756237][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 417.773665][T11376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.908271][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 417.916784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.957624][T11455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 417.996466][T11455] 8021q: adding VLAN 0 to HW filter on device batadv0 18:11:20 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x1], 0x1f004}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000000)="b8010000000f01c1f20f01df64640f07660fe94000b8010000000f01d90f353e0f232fb9f30800000f3266ba420066ed0f20d835200000000f22d8", 0x3b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getpgrp(0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x0) 18:11:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:20 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:20 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:20 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_names='bridge_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 18:11:21 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:21 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:22 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:22 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 420.410577][T11503] IPVS: ftp: loaded support on port[0] = 21 [ 420.739637][T11503] chnl_net:caif_netlink_parms(): no params data found [ 420.806914][T11503] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.814199][T11503] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.822272][T11503] device bridge_slave_0 entered promiscuous mode [ 420.831823][T11503] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.839096][T11503] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.861300][T11503] device bridge_slave_1 entered promiscuous mode [ 420.907444][T11503] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 420.926479][T11503] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 420.974423][T11503] team0: Port device team_slave_0 added [ 420.992143][T11503] team0: Port device team_slave_1 added [ 421.066853][T11503] device hsr_slave_0 entered promiscuous mode [ 421.114486][T11503] device hsr_slave_1 entered promiscuous mode [ 421.185617][T11503] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.192748][T11503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.200211][T11503] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.207346][T11503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.259968][T11508] IPVS: ftp: loaded support on port[0] = 21 [ 421.355201][T11503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.382587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.392127][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.401188][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.415047][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 421.441520][T11503] 8021q: adding VLAN 0 to HW filter on device team0 [ 421.504250][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.512744][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.519892][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.529750][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.538365][T10733] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.545523][T10733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.590946][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 421.611234][T11508] chnl_net:caif_netlink_parms(): no params data found [ 421.622348][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 421.631651][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 421.663638][T11503] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 421.676641][T11503] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 421.690455][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.700206][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.722330][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 421.760021][T11503] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 421.767909][T11508] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.776056][T11508] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.785265][T11508] device bridge_slave_0 entered promiscuous mode [ 421.804657][T11508] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.811953][T11508] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.835103][T11508] device bridge_slave_1 entered promiscuous mode [ 421.878460][T11508] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 421.897478][T11508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 421.949981][T11508] team0: Port device team_slave_0 added [ 421.980195][T11515] IPVS: ftp: loaded support on port[0] = 21 [ 421.982099][T11508] team0: Port device team_slave_1 added [ 422.096917][T11508] device hsr_slave_0 entered promiscuous mode [ 422.114783][T11508] device hsr_slave_1 entered promiscuous mode [ 423.230407][T11521] IPVS: ftp: loaded support on port[0] = 21 [ 423.279880][T11515] chnl_net:caif_netlink_parms(): no params data found [ 423.842175][T11515] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.849548][T11515] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.857315][T11515] device bridge_slave_0 entered promiscuous mode [ 423.867930][T11515] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.876191][T11515] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.884093][T11515] device bridge_slave_1 entered promiscuous mode [ 424.179781][T11508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 424.196886][T11515] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 424.213558][T11515] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 424.227330][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 424.238823][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 424.509764][T11508] 8021q: adding VLAN 0 to HW filter on device team0 [ 424.815273][T11521] chnl_net:caif_netlink_parms(): no params data found [ 424.827451][T11515] team0: Port device team_slave_0 added [ 424.843778][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 424.852482][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 424.861088][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.868239][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.877718][T11515] team0: Port device team_slave_1 added [ 425.149889][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 425.158953][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 425.168349][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 425.176823][T10733] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.184136][T10733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.235697][T11515] device hsr_slave_0 entered promiscuous mode [ 425.294082][T11515] device hsr_slave_1 entered promiscuous mode [ 425.623122][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 425.644754][T11521] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.651877][T11521] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.660432][T11521] device bridge_slave_0 entered promiscuous mode [ 425.669891][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 425.680099][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 425.689140][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 425.698003][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 425.712822][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 425.721263][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 425.729800][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 425.738721][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 425.754175][T11521] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.761288][T11521] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.770010][T11521] device bridge_slave_1 entered promiscuous mode [ 425.781531][ T31] device bridge_slave_1 left promiscuous mode [ 425.788960][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.845221][ T31] device bridge_slave_0 left promiscuous mode [ 425.851484][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.885865][ T31] device bridge_slave_1 left promiscuous mode [ 425.892094][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.934651][ T31] device bridge_slave_0 left promiscuous mode [ 425.940838][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.995961][ T31] device bridge_slave_1 left promiscuous mode [ 426.002228][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.065059][ T31] device bridge_slave_0 left promiscuous mode [ 426.071333][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.125366][ T31] device bridge_slave_1 left promiscuous mode [ 426.131580][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.186079][ T31] device bridge_slave_0 left promiscuous mode [ 426.192354][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.086846][ T31] device hsr_slave_1 left promiscuous mode [ 433.139700][ T31] device hsr_slave_0 left promiscuous mode [ 433.199112][ T31] team0 (unregistering): Port device team_slave_1 removed [ 433.211227][ T31] team0 (unregistering): Port device team_slave_0 removed [ 433.222543][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 433.262581][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 433.353092][ T31] bond0 (unregistering): Released all slaves [ 433.527818][ T31] device hsr_slave_1 left promiscuous mode [ 433.608142][ T31] device hsr_slave_0 left promiscuous mode [ 433.668067][ T31] team0 (unregistering): Port device team_slave_1 removed [ 433.682035][ T31] team0 (unregistering): Port device team_slave_0 removed [ 433.693462][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 433.740807][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 433.832788][ T31] bond0 (unregistering): Released all slaves [ 434.026003][ T31] device hsr_slave_1 left promiscuous mode [ 434.079693][ T31] device hsr_slave_0 left promiscuous mode [ 434.141204][ T31] team0 (unregistering): Port device team_slave_1 removed [ 434.152917][ T31] team0 (unregistering): Port device team_slave_0 removed [ 434.166025][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 434.210890][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 434.314263][ T31] bond0 (unregistering): Released all slaves [ 434.427218][ T31] device hsr_slave_1 left promiscuous mode [ 434.471932][ T31] device hsr_slave_0 left promiscuous mode [ 434.529102][ T31] team0 (unregistering): Port device team_slave_1 removed [ 434.542016][ T31] team0 (unregistering): Port device team_slave_0 removed [ 434.557908][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 434.597930][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 434.672828][ T31] bond0 (unregistering): Released all slaves [ 434.778419][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 434.788147][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.800477][T11508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 434.834527][T11521] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 434.854744][T11508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 434.866991][T11521] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 434.898649][T11521] team0: Port device team_slave_0 added [ 434.917660][T11521] team0: Port device team_slave_1 added [ 434.995760][T11521] device hsr_slave_0 entered promiscuous mode [ 435.035090][T11521] device hsr_slave_1 entered promiscuous mode [ 435.147655][T11515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 435.214893][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 435.222612][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 435.237721][T11515] 8021q: adding VLAN 0 to HW filter on device team0 [ 435.266620][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 435.276361][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.285446][T11272] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.292666][T11272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.301765][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 18:11:37 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:37 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x0, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:37 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:37 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) [ 435.311524][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 435.320303][T11272] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.327489][T11272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.394461][T11521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 435.417612][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 435.430382][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 435.470824][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 435.499782][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 435.533138][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 435.551994][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:11:37 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:37 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) 18:11:38 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x0, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 436.340427][T11521] 8021q: adding VLAN 0 to HW filter on device team0 [ 436.362520][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 436.379470][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 436.393239][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.411426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 436.427233][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 436.443248][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 436.459918][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 436.485306][T11515] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 436.507223][T11515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 436.523159][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 18:11:38 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 436.534113][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 436.571554][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 18:11:38 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 436.583017][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 436.601448][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.608623][T10733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.641605][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 436.670607][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 436.692876][T10733] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.700089][T10733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.746109][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 436.760314][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 436.787436][T11194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 436.830285][T11515] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 436.917697][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 436.940716][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 436.967632][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 436.984240][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.000435][T11521] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 437.018959][T11521] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 437.137912][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 437.158894][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 437.178661][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.206708][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 437.238084][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.308574][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 437.340066][T11521] 8021q: adding VLAN 0 to HW filter on device batadv0 18:11:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 437.548388][T11567] IPVS: ftp: loaded support on port[0] = 21 18:11:39 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:39 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) 18:11:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x0, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:40 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:40 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) [ 438.979308][T11580] IPVS: ftp: loaded support on port[0] = 21 [ 439.059981][T11567] chnl_net:caif_netlink_parms(): no params data found [ 439.184262][T11567] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.191694][T11567] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.200283][T11567] device bridge_slave_0 entered promiscuous mode [ 439.241908][T11567] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.262772][T11567] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.286450][T11567] device bridge_slave_1 entered promiscuous mode [ 439.343271][T11580] chnl_net:caif_netlink_parms(): no params data found [ 439.390377][T11567] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.489949][T11567] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.543549][T11580] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.562141][T11580] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.608875][T11580] device bridge_slave_0 entered promiscuous mode [ 439.624258][T11567] team0: Port device team_slave_0 added [ 439.631909][T11567] team0: Port device team_slave_1 added [ 439.646530][T11580] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.653655][T11580] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.683099][T11580] device bridge_slave_1 entered promiscuous mode [ 439.756087][T11567] device hsr_slave_0 entered promiscuous mode [ 439.814066][T11567] device hsr_slave_1 entered promiscuous mode [ 439.866736][T11580] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.885922][T11580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.926516][T11580] team0: Port device team_slave_0 added [ 439.953326][T11580] team0: Port device team_slave_1 added [ 440.028028][T11580] device hsr_slave_0 entered promiscuous mode [ 440.084371][T11580] device hsr_slave_1 entered promiscuous mode [ 440.251433][T11567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 440.282468][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 440.291177][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.303351][T11567] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.322504][T11580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 440.348858][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 440.358598][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.367360][T11559] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.374497][T11559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.383066][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.392571][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.401395][T11559] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.408625][T11559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.417781][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 440.439139][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 440.456506][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 440.466185][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 440.474375][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.485751][T11580] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.503850][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 440.512683][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 440.530718][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 440.554366][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 440.563238][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 440.604755][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 440.613589][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.623550][T11272] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.630704][T11272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.646878][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 440.660404][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 440.672332][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 440.690123][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.699335][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.708699][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.718249][T11272] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.725385][T11272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.733628][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 440.750691][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 440.764321][T11567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 440.778852][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 440.787432][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 440.797979][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 440.808882][ T3647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 440.826488][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 440.835831][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 440.844911][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 440.863010][T11567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 440.877709][T11580] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 440.906104][T11580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 440.921255][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.972291][T11580] 8021q: adding VLAN 0 to HW filter on device batadv0 18:11:43 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) 18:11:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:43 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:43 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:43 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000080)) splice(r0, 0x0, r1, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:43 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:44 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:44 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000080)) splice(r0, 0x0, r1, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:45 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000000c0)={{0x0, 0x989680}}, 0x0) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/59, 0x3b}], 0x1) 18:11:45 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:45 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000080)) splice(r0, 0x0, r1, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:45 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:45 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 444.365724][T11645] IPVS: ftp: loaded support on port[0] = 21 [ 444.455040][T11645] chnl_net:caif_netlink_parms(): no params data found [ 444.846221][T11645] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.853425][T11645] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.862172][T11645] device bridge_slave_0 entered promiscuous mode [ 444.870423][T11645] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.877867][T11645] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.886234][T11645] device bridge_slave_1 entered promiscuous mode [ 445.157733][T11650] IPVS: ftp: loaded support on port[0] = 21 [ 445.187444][T11645] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 445.452637][T11645] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 445.483056][T11645] team0: Port device team_slave_0 added [ 445.491881][T11645] team0: Port device team_slave_1 added [ 445.826998][T11645] device hsr_slave_0 entered promiscuous mode [ 445.894085][T11645] device hsr_slave_1 entered promiscuous mode [ 446.519363][T11650] chnl_net:caif_netlink_parms(): no params data found [ 446.554621][ T31] device bridge_slave_1 left promiscuous mode [ 446.560911][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.605022][ T31] device bridge_slave_0 left promiscuous mode [ 446.611276][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.665846][ T31] device bridge_slave_1 left promiscuous mode [ 446.672095][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.705078][ T31] device bridge_slave_0 left promiscuous mode [ 446.711349][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.766020][ T31] device bridge_slave_1 left promiscuous mode [ 446.772271][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.844504][ T31] device bridge_slave_0 left promiscuous mode [ 446.850684][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.895083][ T31] device bridge_slave_1 left promiscuous mode [ 446.901274][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.955054][ T31] device bridge_slave_0 left promiscuous mode [ 446.961340][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.897080][ T31] device hsr_slave_1 left promiscuous mode [ 453.939836][ T31] device hsr_slave_0 left promiscuous mode [ 454.002405][ T31] team0 (unregistering): Port device team_slave_1 removed [ 454.013339][ T31] team0 (unregistering): Port device team_slave_0 removed [ 454.027629][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 454.097905][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 454.191277][ T31] bond0 (unregistering): Released all slaves [ 454.337446][ T31] device hsr_slave_1 left promiscuous mode [ 454.389779][ T31] device hsr_slave_0 left promiscuous mode [ 454.449275][ T31] team0 (unregistering): Port device team_slave_1 removed [ 454.461014][ T31] team0 (unregistering): Port device team_slave_0 removed [ 454.472795][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 454.538724][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 454.622706][ T31] bond0 (unregistering): Released all slaves [ 454.757225][ T31] device hsr_slave_1 left promiscuous mode [ 454.798403][ T31] device hsr_slave_0 left promiscuous mode [ 454.838601][ T31] team0 (unregistering): Port device team_slave_1 removed [ 454.852408][ T31] team0 (unregistering): Port device team_slave_0 removed [ 454.866059][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 454.930289][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 455.023124][ T31] bond0 (unregistering): Released all slaves [ 455.136444][ T31] device hsr_slave_1 left promiscuous mode [ 455.177581][ T31] device hsr_slave_0 left promiscuous mode [ 455.218047][ T31] team0 (unregistering): Port device team_slave_1 removed [ 455.233033][ T31] team0 (unregistering): Port device team_slave_0 removed [ 455.246834][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 455.298092][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 455.373265][ T31] bond0 (unregistering): Released all slaves [ 455.465181][T11650] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.472410][T11650] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.481096][T11650] device bridge_slave_0 entered promiscuous mode [ 455.489848][T11650] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.497102][T11650] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.505121][T11650] device bridge_slave_1 entered promiscuous mode [ 455.528375][T11650] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 455.540333][T11645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 455.557321][T11650] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 455.581560][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 455.589728][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 455.606444][T11650] team0: Port device team_slave_0 added [ 455.614770][T11645] 8021q: adding VLAN 0 to HW filter on device team0 [ 455.625479][T11650] team0: Port device team_slave_1 added [ 455.706507][T11650] device hsr_slave_0 entered promiscuous mode [ 455.774279][T11650] device hsr_slave_1 entered promiscuous mode [ 455.835918][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 455.848829][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 455.857405][T11559] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.864493][T11559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.872277][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 455.881538][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 455.890073][T11559] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.897219][T11559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.920773][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 455.930840][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 455.940623][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 455.965956][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 455.978167][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 455.986917][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 455.998039][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 456.006696][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 456.015301][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 456.023610][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 456.039088][T11645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 456.050929][T11645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 456.061423][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 456.071423][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 456.112179][T11645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 456.145597][T11650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 456.169007][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 456.177502][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.185818][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.197978][T11650] 8021q: adding VLAN 0 to HW filter on device team0 [ 456.213428][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 456.222272][T11272] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.229407][T11272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.238668][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 456.254242][T11272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 456.262795][T11272] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.269939][T11272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.308470][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 456.319277][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 456.339705][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 456.356079][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 456.370328][T10356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 456.382634][T11650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 456.432266][T11650] 8021q: adding VLAN 0 to HW filter on device batadv0 18:11:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:58 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:11:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 18:11:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:58 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:58 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:11:59 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x10, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:11:59 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r3, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:11:59 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:12:00 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:12:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}) 18:12:00 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 459.310075][T11705] IPVS: ftp: loaded support on port[0] = 21 [ 459.431611][T11705] chnl_net:caif_netlink_parms(): no params data found [ 459.477485][T11705] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.485365][T11705] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.493551][T11705] device bridge_slave_0 entered promiscuous mode [ 459.502844][T11705] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.510700][T11705] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.519352][T11705] device bridge_slave_1 entered promiscuous mode [ 459.542103][T11705] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 459.555266][T11705] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 459.581370][T11705] team0: Port device team_slave_0 added [ 459.589882][T11705] team0: Port device team_slave_1 added [ 459.685528][T11705] device hsr_slave_0 entered promiscuous mode [ 459.763185][T11705] device hsr_slave_1 entered promiscuous mode [ 459.833480][T11705] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.840764][T11705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.848537][T11705] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.855679][T11705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.963380][T11705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 459.993996][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 460.012506][T10355] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.020791][T10355] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.037912][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 460.061083][T11705] 8021q: adding VLAN 0 to HW filter on device team0 [ 460.063517][T11708] IPVS: ftp: loaded support on port[0] = 21 [ 460.080153][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 460.099739][T10355] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.106923][T10355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.138280][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 460.147582][T10355] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.155023][T10355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.189463][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 460.201169][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 460.214452][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 460.236302][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 460.253011][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 460.273069][T11705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 460.331558][T11708] chnl_net:caif_netlink_parms(): no params data found [ 460.741248][T11705] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 460.793115][T11711] IPVS: ftp: loaded support on port[0] = 21 [ 460.997387][T11708] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.005554][T11708] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.015071][T11708] device bridge_slave_0 entered promiscuous mode [ 461.217907][T11708] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.225565][T11708] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.233335][T11708] device bridge_slave_1 entered promiscuous mode [ 461.549031][T11708] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 461.718797][T11708] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 461.930926][T11708] team0: Port device team_slave_0 added [ 462.003560][T11708] team0: Port device team_slave_1 added [ 462.266942][T11708] device hsr_slave_0 entered promiscuous mode [ 462.304245][T11708] device hsr_slave_1 entered promiscuous mode [ 462.348162][T11711] chnl_net:caif_netlink_parms(): no params data found [ 462.769321][T11711] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.776684][T11711] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.784932][T11711] device bridge_slave_0 entered promiscuous mode [ 462.992323][T11711] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.000282][T11711] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.008599][T11711] device bridge_slave_1 entered promiscuous mode [ 463.034515][ T31] device bridge_slave_1 left promiscuous mode [ 463.040809][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.095314][ T31] device bridge_slave_0 left promiscuous mode [ 463.101579][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.155114][ T31] device bridge_slave_1 left promiscuous mode [ 463.161314][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.218607][ T31] device bridge_slave_0 left promiscuous mode [ 463.224958][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.285038][ T31] device bridge_slave_1 left promiscuous mode [ 463.291274][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.354902][ T31] device bridge_slave_0 left promiscuous mode [ 463.361141][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.387160][ T31] device hsr_slave_1 left promiscuous mode [ 468.430553][ T31] device hsr_slave_0 left promiscuous mode [ 468.469505][ T31] team0 (unregistering): Port device team_slave_1 removed [ 468.481295][ T31] team0 (unregistering): Port device team_slave_0 removed [ 468.494612][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 468.567648][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 468.661843][ T31] bond0 (unregistering): Released all slaves [ 468.807170][ T31] device hsr_slave_1 left promiscuous mode [ 468.850005][ T31] device hsr_slave_0 left promiscuous mode [ 468.898050][ T31] team0 (unregistering): Port device team_slave_1 removed [ 468.912325][ T31] team0 (unregistering): Port device team_slave_0 removed [ 468.924198][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 468.959289][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 469.043200][ T31] bond0 (unregistering): Released all slaves [ 469.217505][ T31] device hsr_slave_1 left promiscuous mode [ 469.259630][ T31] device hsr_slave_0 left promiscuous mode [ 469.327276][ T31] team0 (unregistering): Port device team_slave_1 removed [ 469.342255][ T31] team0 (unregistering): Port device team_slave_0 removed [ 469.354056][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 469.381232][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 469.473055][ T31] bond0 (unregistering): Released all slaves [ 469.560197][T11711] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 469.580553][T11711] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 469.608115][T11711] team0: Port device team_slave_0 added [ 469.615993][T11711] team0: Port device team_slave_1 added [ 469.695678][T11711] device hsr_slave_0 entered promiscuous mode [ 469.754023][T11711] device hsr_slave_1 entered promiscuous mode [ 469.808037][T11708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 469.844090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 469.851871][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 469.863643][T11708] 8021q: adding VLAN 0 to HW filter on device team0 [ 469.879734][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 469.888912][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 469.897679][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.905438][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.913481][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 469.922360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 469.931305][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.938455][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.951482][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 469.959702][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 469.991039][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 470.001618][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 470.011084][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 470.019700][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 470.029431][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 470.038114][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 470.046483][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 470.057557][T11559] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 470.072801][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 470.083340][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 470.095179][T11708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 470.126595][T11708] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 470.154786][T11711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 470.289273][T11711] 8021q: adding VLAN 0 to HW filter on device team0 [ 470.310143][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 470.325226][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 470.355886][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 470.378963][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 470.398896][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.406193][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.420231][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 470.429328][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 470.444942][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.452669][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.493257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 470.531095][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 18:12:12 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:12:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup(0xffffffffffffffff) ioctl$KDENABIO(r0, 0x4b36) 18:12:12 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x10, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:12:12 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:12:12 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) [ 470.543023][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 470.586173][T10734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 470.622815][T11711] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 470.663286][T11711] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 470.715197][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 470.739665][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 470.777629][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 470.815002][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 18:12:12 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) r0 = syz_open_dev$usb(0x0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmod(r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x183280, 0x0) unshare(0x40000000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x6}}, 0x20) ioctl$TCSETS(r1, 0x5402, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x87, @mcast2}, {0xa, 0x4e23, 0x1, @empty}, 0xffffffffffffffff, 0xa9bf}}, 0x48) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) lsetxattr$security_ima(0x0, &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7faaea444bbef2f4430990201a15827c075cb050"}, 0x15, 0x3) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) 18:12:13 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:12:13 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) [ 471.511316][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 471.538398][T11711] 8021q: adding VLAN 0 to HW filter on device batadv0 18:12:13 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) 18:12:13 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x10, r2, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:12:14 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:12:14 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) connect$pppoe(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 18:12:14 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\xbb\x0f\xe8\xfaV\xdcFv\x91\x1e&\xd6\xe2\xde\x11\x00Bf]\xf0V^\xc1\x9fw\xcb\x11\x84\x16F\xa1\xb6\x17Fv\xdf\xd2\xf5j\xa9\xd67\xd3\xa0e4U\r\xb3u\xab\xcf\v\x8c5\xdb++\xd4\xddS\xf4\'\x83\x05\xbf\x17\t\xea\xb2\x14\xf1]\x13\xeb\x89%\x86\xa5\f\xde\x8f\x90?\xefj\x8f?\xf7\xe7\xa7\xf4_\fV\vr\x10hh\x002\xfd[\x02\xc7Og\xa9\xb4=VC6\xb7\x7f\xfcA\x95\xa9_H/aG\x95\x86\xf6aT\xa9b\x8d\x8d\xd4B\xb4\xfc\xf9\x9f\xcb\f\x9d1\a\x10C9m\x7f\xa9\xe9\x17', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x69, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1fffff9, 0x11, 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 18:12:14 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) getsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x4) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:12:15 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x2) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) readlink(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0xfe2b08bceb2fa9dd) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001580)=""/234, 0xea) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000580), 0xefee) 18:12:15 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) connect$pppoe(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 473.973249][T11768] IPVS: ftp: loaded support on port[0] = 21 [ 473.984834][T11776] IPVS: ftp: loaded support on port[0] = 21 [ 474.143597][T11776] chnl_net:caif_netlink_parms(): no params data found [ 474.560315][T11776] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.569365][T11776] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.582958][T11776] device bridge_slave_0 entered promiscuous mode [ 474.821207][T11776] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.828508][T11776] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.836362][T11776] device bridge_slave_1 entered promiscuous mode [ 475.020091][T11768] chnl_net:caif_netlink_parms(): no params data found [ 475.050512][T11776] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 475.066743][T11776] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 475.278452][T11776] team0: Port device team_slave_0 added [ 475.292132][T11776] team0: Port device team_slave_1 added [ 475.309554][T11768] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.316849][T11768] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.325989][T11768] device bridge_slave_0 entered promiscuous mode [ 475.518446][T11768] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.526651][T11768] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.535205][T11768] device bridge_slave_1 entered promiscuous mode [ 475.587038][T11776] device hsr_slave_0 entered promiscuous mode [ 475.634224][T11776] device hsr_slave_1 entered promiscuous mode [ 475.887709][T11768] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 475.904827][T11768] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 476.111466][T11768] team0: Port device team_slave_0 added [ 476.122618][T11768] team0: Port device team_slave_1 added [ 476.367323][T11768] device hsr_slave_0 entered promiscuous mode [ 476.404164][T11768] device hsr_slave_1 entered promiscuous mode [ 476.668987][ T31] device bridge_slave_1 left promiscuous mode [ 476.676796][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.744969][ T31] device bridge_slave_0 left promiscuous mode [ 476.751179][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.806241][ T31] device bridge_slave_1 left promiscuous mode [ 476.812443][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.845117][ T31] device bridge_slave_0 left promiscuous mode [ 476.851326][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.915202][ T31] device bridge_slave_1 left promiscuous mode [ 476.921515][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.965080][ T31] device bridge_slave_0 left promiscuous mode [ 476.971355][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.826967][ T31] device hsr_slave_1 left promiscuous mode [ 481.870335][ T31] device hsr_slave_0 left promiscuous mode [ 481.929055][ T31] team0 (unregistering): Port device team_slave_1 removed [ 481.940611][ T31] team0 (unregistering): Port device team_slave_0 removed [ 481.952957][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 482.010448][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 482.100960][ T31] bond0 (unregistering): Released all slaves [ 482.227261][ T31] device hsr_slave_1 left promiscuous mode [ 482.269120][ T31] device hsr_slave_0 left promiscuous mode [ 482.346857][ T31] team0 (unregistering): Port device team_slave_1 removed [ 482.360213][ T31] team0 (unregistering): Port device team_slave_0 removed [ 482.371694][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 482.411318][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 482.502410][ T31] bond0 (unregistering): Released all slaves [ 482.657307][ T31] device hsr_slave_1 left promiscuous mode [ 482.699429][ T31] device hsr_slave_0 left promiscuous mode [ 482.767278][ T31] team0 (unregistering): Port device team_slave_1 removed [ 482.782475][ T31] team0 (unregistering): Port device team_slave_0 removed [ 482.804316][ T31] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 482.840114][ T31] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 482.940248][ T31] bond0 (unregistering): Released all slaves [ 483.041830][T11776] 8021q: adding VLAN 0 to HW filter on device bond0 [ 483.057760][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 483.066094][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 483.077438][T11776] 8021q: adding VLAN 0 to HW filter on device team0 [ 483.091098][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 483.100306][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 483.108976][T10355] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.116099][T10355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.126425][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 483.150329][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 483.159318][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 483.168607][T10733] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.175749][T10733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.184837][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 483.193630][T10733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 483.211109][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 483.220456][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 483.230114][ T31] ------------[ cut here ]------------ [ 483.237640][ T31] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 483.240687][T11776] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 483.248748][ T31] WARNING: CPU: 1 PID: 31 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 483.262340][T11776] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 483.268425][ T31] Kernel panic - not syncing: panic_on_warn set ... [ 483.268441][ T31] CPU: 1 PID: 31 Comm: kworker/u4:2 Not tainted 5.2.0-rc3+ #16 [ 483.268447][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.268466][ T31] Workqueue: netns cleanup_net [ 483.268472][ T31] Call Trace: [ 483.268500][ T31] dump_stack+0x172/0x1f0 [ 483.292824][T11768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 483.293372][ T31] ? debug_print_object+0x70/0x250 [ 483.323026][T11776] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 483.327458][ T31] panic+0x2cb/0x744 [ 483.327472][ T31] ? __warn_printk+0xf3/0xf3 [ 483.327489][ T31] ? debug_print_object+0x168/0x250 [ 483.327503][ T31] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.327517][ T31] ? __warn.cold+0x5/0x4d [ 483.327530][ T31] ? __warn+0xe8/0x1d0 [ 483.327550][ T31] ? debug_print_object+0x168/0x250 [ 483.338391][T11776] kobject: 'vlan0' (00000000655ebb26): kobject_add_internal: parent: 'mesh', set: '' [ 483.342895][ T31] __warn.cold+0x20/0x4d [ 483.353580][T11768] 8021q: adding VLAN 0 to HW filter on device team0 [ 483.354327][ T31] ? debug_print_object+0x168/0x250 [ 483.354342][ T31] report_bug+0x263/0x2b0 [ 483.354358][ T31] do_error_trap+0x11b/0x200 [ 483.354373][ T31] do_invalid_op+0x37/0x50 [ 483.354385][ T31] ? debug_print_object+0x168/0x250 [ 483.354398][ T31] invalid_op+0x14/0x20 [ 483.354412][ T31] RIP: 0010:debug_print_object+0x168/0x250 [ 483.354424][ T31] Code: dd 20 cb a4 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 20 cb a4 87 48 c7 c7 c0 c0 a4 87 e8 16 83 0d fe <0f> 0b 83 05 8b 57 4b 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 483.354430][ T31] RSP: 0018:ffff8880a9af7838 EFLAGS: 00010086 [ 483.354439][ T31] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 483.354447][ T31] RDX: 0000000000000000 RSI: ffffffff815ac976 RDI: ffffed101535eef9 [ 483.354463][ T31] RBP: ffff8880a9af7878 R08: ffff8880a9ae40c0 R09: ffffed1015d240f1 [ 483.388777][T11768] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 483.388813][ T31] R10: ffffed1015d240f0 R11: ffff8880ae920787 R12: 0000000000000001 [ 483.397584][T11768] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 483.398441][ T31] R13: ffffffff88bad1a0 R14: ffffffff816039f0 R15: ffff88805fcd20a0 [ 483.418852][T11768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 483.422553][ T31] ? calc_wheel_index+0x220/0x220 [ 483.452904][T11768] kobject: 'vlan0' (000000006b2b57c5): kobject_add_internal: parent: 'mesh', set: '' [ 483.456468][ T31] ? vprintk_func+0x86/0x189 [ 483.456487][ T31] ? debug_print_object+0x168/0x250 [ 483.456500][ T31] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 483.456517][ T31] debug_check_no_obj_freed+0x29f/0x464 [ 483.456534][ T31] kfree+0xbd/0x220 [ 483.456556][ T31] kvfree+0x61/0x70 [ 483.559758][ T31] netdev_freemem+0x4c/0x60 [ 483.564278][ T31] netdev_release+0x86/0xb0 [ 483.568802][ T31] ? xps_cpus_store+0x2b0/0x2b0 [ 483.573661][ T31] device_release+0x7a/0x210 [ 483.578273][ T31] kobject_put.cold+0x289/0x2e6 [ 483.583136][ T31] netdev_run_todo+0x53b/0x7c0 [ 483.587916][ T31] ? register_netdev+0x50/0x50 [ 483.592697][ T31] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 483.598693][ T31] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 483.604945][ T31] ? net_set_todo+0xbf/0x150 [ 483.609551][ T31] rtnl_unlock+0xe/0x10 [ 483.613718][ T31] default_device_exit_batch+0x358/0x410 [ 483.619369][ T31] ? unregister_netdevice_many+0x50/0x50 [ 483.625019][ T31] ? default_device_exit+0x203/0x290 [ 483.630323][ T31] ? do_wait_intr_irq+0x2b0/0x2b0 [ 483.635536][ T31] ? rtnl_unlock+0xe/0x10 [ 483.639880][ T31] ? unregister_netdevice_many+0x50/0x50 [ 483.645532][ T31] ? dev_change_net_namespace+0xc70/0xc70 [ 483.651270][ T31] ops_exit_list.isra.0+0xfc/0x150 [ 483.656409][ T31] cleanup_net+0x3fb/0x960 [ 483.660842][ T31] ? netns_install+0x1d0/0x1d0 [ 483.665647][ T31] process_one_work+0x989/0x1790 [ 483.670701][ T31] ? pwq_dec_nr_in_flight+0x320/0x320 [ 483.676111][ T31] ? lock_acquire+0x16f/0x3f0 [ 483.680820][ T31] worker_thread+0x98/0xe40 [ 483.685341][ T31] kthread+0x354/0x420 [ 483.689424][ T31] ? process_one_work+0x1790/0x1790 [ 483.694628][ T31] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 483.700971][ T31] ret_from_fork+0x24/0x30 [ 483.705400][ T31] [ 483.705407][ T31] ====================================================== [ 483.705413][ T31] WARNING: possible circular locking dependency detected [ 483.705417][ T31] 5.2.0-rc3+ #16 Not tainted [ 483.705423][ T31] ------------------------------------------------------ [ 483.705429][ T31] kworker/u4:2/31 is trying to acquire lock: [ 483.705432][ T31] 000000000b6138e0 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 483.705448][ T31] [ 483.705453][ T31] but task is already holding lock: [ 483.705456][ T31] 000000000a0d0be8 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 483.705472][ T31] [ 483.705477][ T31] which lock already depends on the new lock. [ 483.705480][ T31] [ 483.705483][ T31] [ 483.705488][ T31] the existing dependency chain (in reverse order) is: [ 483.705491][ T31] [ 483.705493][ T31] -> #3 (&obj_hash[i].lock){-.-.}: [ 483.705509][ T31] _raw_spin_lock_irqsave+0x95/0xcd [ 483.705514][ T31] __debug_object_init+0xc6/0xc30 [ 483.705518][ T31] debug_object_init+0x16/0x20 [ 483.705522][ T31] hrtimer_init+0x2a/0x300 [ 483.705527][ T31] init_dl_task_timer+0x1b/0x50 [ 483.705531][ T31] __sched_fork+0x22a/0x4f0 [ 483.705535][ T31] init_idle+0x75/0x670 [ 483.705540][ T31] sched_init+0x952/0x9f5 [ 483.705544][ T31] start_kernel+0x393/0x893 [ 483.705549][ T31] x86_64_start_reservations+0x29/0x2b [ 483.705553][ T31] x86_64_start_kernel+0x77/0x7b [ 483.705558][ T31] secondary_startup_64+0xa4/0xb0 [ 483.705561][ T31] [ 483.705563][ T31] -> #2 (&rq->lock){-.-.}: [ 483.705578][ T31] _raw_spin_lock+0x2f/0x40 [ 483.705582][ T31] task_fork_fair+0x6a/0x520 [ 483.705586][ T31] sched_fork+0x3af/0x900 [ 483.705591][ T31] copy_process.part.0+0x1a25/0x6790 [ 483.705595][ T31] _do_fork+0x25d/0xfe0 [ 483.705600][ T31] kernel_thread+0x34/0x40 [ 483.705604][ T31] rest_init+0x28/0x37b [ 483.705608][ T31] arch_call_rest_init+0xe/0x1b [ 483.705612][ T31] start_kernel+0x854/0x893 [ 483.705617][ T31] x86_64_start_reservations+0x29/0x2b [ 483.705622][ T31] x86_64_start_kernel+0x77/0x7b [ 483.705626][ T31] secondary_startup_64+0xa4/0xb0 [ 483.705629][ T31] [ 483.705632][ T31] -> #1 (&p->pi_lock){-.-.}: [ 483.705647][ T31] _raw_spin_lock_irqsave+0x95/0xcd [ 483.705651][ T31] try_to_wake_up+0x90/0x13f0 [ 483.705656][ T31] wake_up_process+0x10/0x20 [ 483.705660][ T31] __up.isra.0+0x136/0x1a0 [ 483.705663][ T31] up+0x9c/0xe0 [ 483.705673][ T31] __up_console_sem+0xb7/0x1c0 [ 483.705677][ T31] console_unlock+0x663/0xec0 [ 483.705682][ T31] do_con_write.part.0+0xeec/0x1ed0 [ 483.705686][ T31] con_write+0x46/0xd0 [ 483.705690][ T31] n_tty_write+0x3fe/0x1140 [ 483.705694][ T31] tty_write+0x458/0x7a0 [ 483.705699][ T31] __vfs_write+0x8a/0x110 [ 483.705703][ T31] vfs_write+0x20c/0x580 [ 483.705707][ T31] ksys_write+0x14f/0x290 [ 483.705711][ T31] __x64_sys_write+0x73/0xb0 [ 483.705716][ T31] do_syscall_64+0xfd/0x680 [ 483.705721][ T31] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.705723][ T31] [ 483.705726][ T31] -> #0 ((console_sem).lock){-.-.}: [ 483.705741][ T31] lock_acquire+0x16f/0x3f0 [ 483.705746][ T31] _raw_spin_lock_irqsave+0x95/0xcd [ 483.705750][ T31] down_trylock+0x13/0x70 [ 483.705755][ T31] __down_trylock_console_sem+0xa8/0x210 [ 483.705759][ T31] console_trylock+0x15/0xa0 [ 483.705764][ T31] vprintk_emit+0x283/0x700 [ 483.705768][ T31] vprintk_default+0x28/0x30 [ 483.705772][ T31] vprintk_func+0x7e/0x189 [ 483.705776][ T31] printk+0xba/0xed [ 483.705781][ T31] __warn_printk+0x9b/0xf3 [ 483.705785][ T31] debug_print_object+0x168/0x250 [ 483.705790][ T31] debug_check_no_obj_freed+0x29f/0x464 [ 483.705794][ T31] kfree+0xbd/0x220 [ 483.705798][ T31] kvfree+0x61/0x70 [ 483.705802][ T31] netdev_freemem+0x4c/0x60 [ 483.705807][ T31] netdev_release+0x86/0xb0 [ 483.705811][ T31] device_release+0x7a/0x210 [ 483.705815][ T31] kobject_put.cold+0x289/0x2e6 [ 483.705820][ T31] netdev_run_todo+0x53b/0x7c0 [ 483.705824][ T31] rtnl_unlock+0xe/0x10 [ 483.705829][ T31] default_device_exit_batch+0x358/0x410 [ 483.705834][ T31] ops_exit_list.isra.0+0xfc/0x150 [ 483.705838][ T31] cleanup_net+0x3fb/0x960 [ 483.705842][ T31] process_one_work+0x989/0x1790 [ 483.705847][ T31] worker_thread+0x98/0xe40 [ 483.705851][ T31] kthread+0x354/0x420 [ 483.705855][ T31] ret_from_fork+0x24/0x30 [ 483.705858][ T31] [ 483.705862][ T31] other info that might help us debug this: [ 483.705865][ T31] [ 483.705868][ T31] Chain exists of: [ 483.705871][ T31] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 483.705890][ T31] [ 483.705895][ T31] Possible unsafe locking scenario: [ 483.705897][ T31] [ 483.705902][ T31] CPU0 CPU1 [ 483.705906][ T31] ---- ---- [ 483.705909][ T31] lock(&obj_hash[i].lock); [ 483.705919][ T31] lock(&rq->lock); [ 483.705929][ T31] lock(&obj_hash[i].lock); [ 483.705938][ T31] lock((console_sem).lock); [ 483.705946][ T31] [ 483.705950][ T31] *** DEADLOCK *** [ 483.705953][ T31] [ 483.705957][ T31] 4 locks held by kworker/u4:2/31: [ 483.705960][ T31] #0: 00000000321435cb ((wq_completion)netns){+.+.}, at: process_one_work+0x87e/0x1790 [ 483.705978][ T31] #1: 00000000acd2154b (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 483.705997][ T31] #2: 00000000797ac011 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 483.706015][ T31] #3: 000000000a0d0be8 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 483.706034][ T31] [ 483.706037][ T31] stack backtrace: [ 483.706043][ T31] CPU: 1 PID: 31 Comm: kworker/u4:2 Not tainted 5.2.0-rc3+ #16 [ 483.706050][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.706054][ T31] Workqueue: netns cleanup_net [ 483.706060][ T31] Call Trace: [ 483.706064][ T31] dump_stack+0x172/0x1f0 [ 483.706069][ T31] print_circular_bug.cold+0x1cc/0x28f [ 483.706073][ T31] __lock_acquire+0x3755/0x5490 [ 483.706077][ T31] ? mark_held_locks+0xf0/0xf0 [ 483.706081][ T31] ? enable_ptr_key_workfn+0x30/0x30 [ 483.706085][ T31] ? kvm_clock_read+0x18/0x30 [ 483.706090][ T31] ? kvm_sched_clock_read+0x9/0x20 [ 483.706094][ T31] lock_acquire+0x16f/0x3f0 [ 483.706098][ T31] ? down_trylock+0x13/0x70 [ 483.706102][ T31] _raw_spin_lock_irqsave+0x95/0xcd [ 483.706106][ T31] ? down_trylock+0x13/0x70 [ 483.706110][ T31] ? vprintk_emit+0x283/0x700 [ 483.706114][ T31] down_trylock+0x13/0x70 [ 483.706118][ T31] ? vprintk_emit+0x283/0x700 [ 483.706123][ T31] __down_trylock_console_sem+0xa8/0x210 [ 483.706127][ T31] console_trylock+0x15/0xa0 [ 483.706131][ T31] vprintk_emit+0x283/0x700 [ 483.706135][ T31] ? calc_wheel_index+0x220/0x220 [ 483.706139][ T31] vprintk_default+0x28/0x30 [ 483.706143][ T31] vprintk_func+0x7e/0x189 [ 483.706146][ T31] printk+0xba/0xed [ 483.706151][ T31] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 483.706155][ T31] ? mark_held_locks+0xf0/0xf0 [ 483.706159][ T31] ? mark_held_locks+0xf0/0xf0 [ 483.706163][ T31] ? __warn_printk+0x8f/0xf3 [ 483.706167][ T31] ? queue_work_node+0x360/0x360 [ 483.706171][ T31] __warn_printk+0x9b/0xf3 [ 483.706175][ T31] ? add_taint.cold+0x16/0x16 [ 483.706179][ T31] ? kasan_check_write+0x14/0x20 [ 483.706183][ T31] ? lock_downgrade+0x880/0x880 [ 483.706188][ T31] ? queue_work_node+0x360/0x360 [ 483.706192][ T31] debug_print_object+0x168/0x250 [ 483.706197][ T31] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 483.706201][ T31] debug_check_no_obj_freed+0x29f/0x464 [ 483.706205][ T31] kfree+0xbd/0x220 [ 483.706208][ T31] kvfree+0x61/0x70 [ 483.706212][ T31] netdev_freemem+0x4c/0x60 [ 483.706216][ T31] netdev_release+0x86/0xb0 [ 483.706220][ T31] ? xps_cpus_store+0x2b0/0x2b0 [ 483.706224][ T31] device_release+0x7a/0x210 [ 483.706228][ T31] kobject_put.cold+0x289/0x2e6 [ 483.706232][ T31] netdev_run_todo+0x53b/0x7c0 [ 483.706236][ T31] ? register_netdev+0x50/0x50 [ 483.706241][ T31] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 483.706246][ T31] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 483.706250][ T31] ? net_set_todo+0xbf/0x150 [ 483.706254][ T31] rtnl_unlock+0xe/0x10 [ 483.706258][ T31] default_device_exit_batch+0x358/0x410 [ 483.706263][ T31] ? unregister_netdevice_many+0x50/0x50 [ 483.706267][ T31] ? default_device_exit+0x203/0x290 [ 483.706272][ T31] ? do_wait_intr_irq+0x2b0/0x2b0 [ 483.706276][ T31] ? rtnl_unlock+0xe/0x10 [ 483.706280][ T31] ? unregister_netdevice_many+0x50/0x50 [ 483.706285][ T31] ? dev_change_net_namespace+0xc70/0xc70 [ 483.706289][ T31] ops_exit_list.isra.0+0xfc/0x150 [ 483.706293][ T31] cleanup_net+0x3fb/0x960 [ 483.706298][ T31] ? netns_install+0x1d0/0x1d0 [ 483.706302][ T31] process_one_work+0x989/0x1790 [ 483.706306][ T31] ? pwq_dec_nr_in_flight+0x320/0x320 [ 483.706310][ T31] ? lock_acquire+0x16f/0x3f0 [ 483.706314][ T31] worker_thread+0x98/0xe40 [ 483.706318][ T31] kthread+0x354/0x420 [ 483.706323][ T31] ? process_one_work+0x1790/0x1790 [ 483.706328][ T31] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 483.706332][ T31] ret_from_fork+0x24/0x30 [ 484.830342][ T31] Shutting down cpus with NMI [ 485.764543][ T31] Kernel Offset: disabled [ 485.768876][ T31] Rebooting in 86400 seconds..