0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:11:07 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:07 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:07 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 546.555384][T13487] IPVS: ftp: loaded support on port[0] = 21 [ 546.656634][T13487] chnl_net:caif_netlink_parms(): no params data found [ 546.712147][T13487] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.719348][T13487] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.734404][T13487] device bridge_slave_0 entered promiscuous mode [ 546.742993][T13487] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.758130][T13487] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.768393][T13487] device bridge_slave_1 entered promiscuous mode [ 546.803266][T13487] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 546.815768][T13487] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 546.839252][T13487] team0: Port device team_slave_0 added [ 546.847196][T13487] team0: Port device team_slave_1 added [ 546.956909][T13487] device hsr_slave_0 entered promiscuous mode [ 546.994558][T13487] device hsr_slave_1 entered promiscuous mode [ 547.091486][T13487] 8021q: adding VLAN 0 to HW filter on device bond0 [ 547.102764][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 547.110670][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 547.121383][T13487] 8021q: adding VLAN 0 to HW filter on device team0 [ 547.131605][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 547.140358][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 547.150150][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 547.157266][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 547.166889][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 547.178146][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 547.187098][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 547.195605][T10555] bridge0: port 2(bridge_slave_1) entered blocking state [ 547.202883][T10555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 547.224956][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 547.233710][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 547.243097][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 547.252408][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 547.262045][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 547.272910][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 547.287722][T13487] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 547.299043][T13487] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 547.311978][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 547.319883][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 547.328677][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 547.337524][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 547.346145][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 547.354590][ T9169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 547.373945][T13487] 8021q: adding VLAN 0 to HW filter on device batadv0 23:11:09 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:09 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) 23:11:09 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:09 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:09 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:09 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:11:09 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:09 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:09 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:09 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:09 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:09 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:10 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) [ 548.903053][T13524] IPVS: ftp: loaded support on port[0] = 21 [ 549.165551][T13526] IPVS: ftp: loaded support on port[0] = 21 [ 549.376206][T13524] chnl_net:caif_netlink_parms(): no params data found [ 549.419401][T13524] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.430699][T13524] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.438517][T13524] device bridge_slave_0 entered promiscuous mode [ 549.631257][T13524] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.638563][T13524] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.646681][T13524] device bridge_slave_1 entered promiscuous mode [ 549.672669][T13524] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 549.683914][T13524] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 549.913053][T13524] team0: Port device team_slave_0 added [ 550.098935][T13526] chnl_net:caif_netlink_parms(): no params data found [ 550.109728][T13524] team0: Port device team_slave_1 added [ 550.187148][T13524] device hsr_slave_0 entered promiscuous mode [ 550.234714][T13524] device hsr_slave_1 entered promiscuous mode [ 550.284210][T13524] debugfs: Directory 'hsr0' with parent '/' already present! [ 550.304889][T13526] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.312241][T13526] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.324366][T13526] device bridge_slave_0 entered promiscuous mode [ 550.333936][T13526] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.341238][T13526] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.349672][T13526] device bridge_slave_1 entered promiscuous mode [ 550.553830][T13526] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 550.566461][T13526] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 550.589521][T13526] team0: Port device team_slave_0 added [ 550.598505][T13526] team0: Port device team_slave_1 added [ 550.606680][ T8073] device bridge_slave_1 left promiscuous mode [ 550.612873][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.655664][ T8073] device bridge_slave_0 left promiscuous mode [ 550.661957][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.726082][ T8073] device bridge_slave_1 left promiscuous mode [ 550.732285][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.765560][ T8073] device bridge_slave_0 left promiscuous mode [ 550.771811][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.826446][ T8073] device bridge_slave_1 left promiscuous mode [ 550.832690][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.875022][ T8073] device bridge_slave_0 left promiscuous mode [ 550.881426][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.934920][ T8073] device hsr_slave_0 left promiscuous mode [ 555.974312][ T8073] device hsr_slave_1 left promiscuous mode [ 556.033990][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 556.046559][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 556.057450][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 556.097738][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 556.182292][ T8073] bond0 (unregistering): Released all slaves [ 556.304926][ T8073] device hsr_slave_0 left promiscuous mode [ 556.354357][ T8073] device hsr_slave_1 left promiscuous mode [ 556.402497][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 556.414443][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 556.426606][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 556.487767][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 556.592852][ T8073] bond0 (unregistering): Released all slaves [ 556.734933][ T8073] device hsr_slave_0 left promiscuous mode [ 556.784533][ T8073] device hsr_slave_1 left promiscuous mode [ 556.853954][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 556.864679][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 556.877152][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 556.928015][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 556.993799][ T8073] bond0 (unregistering): Released all slaves [ 557.146271][T13526] device hsr_slave_0 entered promiscuous mode [ 557.194625][T13526] device hsr_slave_1 entered promiscuous mode [ 557.234299][T13526] debugfs: Directory 'hsr0' with parent '/' already present! [ 557.274579][T13524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 557.292500][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 557.301264][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 557.312366][T13524] 8021q: adding VLAN 0 to HW filter on device team0 [ 557.331094][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 557.340411][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 557.349127][T10555] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.356245][T10555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.374435][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 557.382320][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 557.391903][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 557.400745][T10555] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.407857][T10555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.415948][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 557.424662][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 557.433215][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 557.441897][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 557.463006][T13524] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 557.473847][T13524] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 557.489229][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 557.497165][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 557.506624][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 557.515072][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 557.523297][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 557.532070][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 557.540432][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 557.548974][ T8049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 557.563293][T13526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 557.582559][T13526] 8021q: adding VLAN 0 to HW filter on device team0 [ 557.597715][T13524] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 557.606669][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 557.614840][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 557.636143][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 557.647836][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 557.656616][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.663646][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.671357][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 557.680057][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 557.688523][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.695604][T13366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.704379][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 557.713491][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 557.727928][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 557.796380][T13526] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 557.806868][T13526] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 557.894600][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 557.903637][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 557.912633][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 557.921859][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 557.931736][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 557.940602][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 557.950407][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 557.958576][T10555] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 558.292136][T13526] 8021q: adding VLAN 0 to HW filter on device batadv0 23:11:20 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:20 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:20 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:20 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:20 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:20 executing program 5: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:11:20 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:20 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:20 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:20 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:20 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:20 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:20 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xf4a5ddd0217ee3a6}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{0x2, 0x2, 0x81, 0x2}, 0x4, 0x3, 0x0, 0x0, "963a6ddd8a7bbdca"}, 0x10}, 0x1, 0x0, 0x0, 0x8001}, 0x80) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000340)=0x78) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000380)={0x1, [0xffffffffffffff99]}, 0x6) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e20, 0x3f, @local, 0x9}}, 0x10000, 0x7, 0x80a, 0x0, 0x18}, &(0x7f0000000480)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000004c0)={r3, 0xdc66}, 0x8) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000500)={'batadv0\x00', @ifru_names='vlan0\x00'}) socket$pppoe(0x18, 0x1, 0x0) getsockname$llc(r0, &(0x7f0000000540)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000580)=0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000005c0)={0x80000000, {{0x2, 0x4e22, @empty}}}, 0x88) r4 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000006c0)={'syz', 0x1}, &(0x7f0000000700)="3c492951f05c275efd13065291c61508272435a8d2281ad1a605a6eda6e06ab62b3ea29117b26b2a9f8fa3b9aeb41d3686d14fc337a06f3ec915f018b48a547c3b04c359b2a926a48e2f2172c0559d91621db5a58613a1ac05cdcda3056f5b18572762d3ccbb4336fb3f41277d6843a7db267ee0fbfbabe6ed9d790d2ec48eb2cd595df4c8087fcd68e18dd2c97bedee998566e2c546c6aa812e88d71f20be382f1cea8a03a7c114a2a8cf1199a54ac29a07267e85606ff5fbd4cbeb43068551b3af3ba55d977fd1c9052a43c8f60ff412", 0xd1, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000800)=[@sack_perm, @timestamp, @timestamp], 0x3) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000880)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x28, r5, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x28}}, 0x40004) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000980)={{0xffffffffffffffff, 0x0, 0xc, 0x3, 0x7}}) bind$alg(r0, &(0x7f00000009c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) prctl$PR_GET_THP_DISABLE(0x2a) r6 = socket$pppoe(0x18, 0x1, 0x0) mkdir(&(0x7f0000000a40)='./file0\x00', 0x80) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000a80)={r2, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000ac0)={r2, 0x1, 0x6, @dev={[], 0x1d}}, 0x10) sysfs$2(0x2, 0x80000001, &(0x7f0000000b00)=""/38) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000b40)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000c40)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in=@empty, 0x4e20, 0x0, 0x4e21, 0x7, 0x2, 0xa0, 0x80, 0xbf, r2, r7}, {0x4, 0x80000001, 0xffffffff, 0x7fff, 0x7085, 0xfffffffffffffff8, 0x7, 0xffffffff}, {0x0, 0x9b, 0x7fffffff, 0x401}, 0x4, 0x6e6bb9, 0x1, 0x1, 0x3}, {{@in6=@mcast2, 0x4d3, 0x3c}, 0xa, @in=@empty, 0x0, 0x0, 0x3, 0x1, 0x3, 0x5, 0x2}}, 0xe8) connect(r0, &(0x7f0000000d80)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x8010008}, 0x80) 23:11:20 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:20 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:20 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 559.959850][T13584] IPVS: ftp: loaded support on port[0] = 21 [ 560.013748][T13584] chnl_net:caif_netlink_parms(): no params data found [ 560.040195][T13584] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.047662][T13584] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.055320][T13584] device bridge_slave_0 entered promiscuous mode [ 560.064147][T13584] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.071248][T13584] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.079152][T13584] device bridge_slave_1 entered promiscuous mode [ 560.093373][T13584] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 560.104988][T13584] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 560.132296][T13584] team0: Port device team_slave_0 added [ 560.146428][T13584] team0: Port device team_slave_1 added [ 560.206561][T13584] device hsr_slave_0 entered promiscuous mode [ 560.248121][T13584] device hsr_slave_1 entered promiscuous mode [ 560.304357][T13584] debugfs: Directory 'hsr0' with parent '/' already present! [ 560.323659][T13587] IPVS: ftp: loaded support on port[0] = 21 [ 560.323934][T13584] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.336737][T13584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.344142][T13584] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.351226][T13584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 560.376631][T13366] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.388783][T13366] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.463768][T13587] chnl_net:caif_netlink_parms(): no params data found [ 560.496632][T13587] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.503785][T13587] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.511889][T13587] device bridge_slave_0 entered promiscuous mode [ 560.520359][T13587] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.527537][T13587] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.535533][T13587] device bridge_slave_1 entered promiscuous mode [ 560.910430][T13587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 560.922768][T13587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 560.946432][T13587] team0: Port device team_slave_0 added [ 560.953102][T13587] team0: Port device team_slave_1 added [ 561.186994][T13587] device hsr_slave_0 entered promiscuous mode [ 561.244605][T13587] device hsr_slave_1 entered promiscuous mode [ 561.304454][T13587] debugfs: Directory 'hsr0' with parent '/' already present! [ 561.317997][T13584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 561.513995][T13587] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.521477][T13587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 561.529012][T13587] bridge0: port 1(bridge_slave_0) entered blocking state [ 561.536100][T13587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 561.547129][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.555932][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.767729][T13584] 8021q: adding VLAN 0 to HW filter on device team0 [ 561.774645][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 561.782438][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 561.805294][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 561.814000][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 561.823554][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 561.830761][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 561.838840][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 561.848264][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 561.856978][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.864130][T13366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 561.872448][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 561.881749][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 561.890410][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 561.899199][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 561.917352][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 562.121412][T13584] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 562.132411][T13584] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 562.144696][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 562.153291][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 562.162595][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 562.171019][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 562.180001][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 562.188891][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 562.197321][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 562.209833][T13587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 562.448344][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 562.456013][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 562.467605][T13587] 8021q: adding VLAN 0 to HW filter on device team0 [ 562.479397][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 562.490189][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 562.498786][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.507221][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 562.519688][T13584] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 562.534286][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 562.543009][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 562.551850][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.559002][ T8050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 562.567101][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 562.770303][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 562.779583][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 562.796062][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 562.808696][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 562.823030][T13587] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 562.833887][T13587] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 563.034286][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 563.042932][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 563.061133][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 563.078422][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 563.088905][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 563.097488][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 23:11:24 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) [ 563.370916][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 563.389685][T13587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 563.416688][ T8073] device bridge_slave_1 left promiscuous mode [ 563.422966][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.465778][ T8073] device bridge_slave_0 left promiscuous mode [ 563.471954][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.555957][ T8073] device bridge_slave_1 left promiscuous mode [ 563.562140][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.625349][ T8073] device bridge_slave_0 left promiscuous mode [ 563.631575][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.675653][ T8073] device bridge_slave_1 left promiscuous mode [ 563.681873][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.745246][ T8073] device bridge_slave_0 left promiscuous mode [ 563.751627][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.674879][ T8073] device hsr_slave_0 left promiscuous mode [ 568.734266][ T8073] device hsr_slave_1 left promiscuous mode [ 568.810935][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 568.823605][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 568.835760][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 568.880808][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 568.966583][ T8073] bond0 (unregistering): Released all slaves [ 569.105165][ T8073] device hsr_slave_0 left promiscuous mode [ 569.154318][ T8073] device hsr_slave_1 left promiscuous mode [ 569.230993][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 569.243662][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 569.255055][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 569.329116][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 569.393953][ T8073] bond0 (unregistering): Released all slaves [ 569.535340][ T8073] device hsr_slave_0 left promiscuous mode [ 569.574364][ T8073] device hsr_slave_1 left promiscuous mode [ 569.623273][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 569.635659][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 569.646333][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 569.707981][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 569.793809][ T8073] bond0 (unregistering): Released all slaves 23:11:31 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) sendto$inet6(r2, &(0x7f00000009c0)="40a8e051dfa9eed2428cac95b41557375d7708db8e719ec217af4a574cd7074fa5734725107f88c7b505c5687531709dd951c31cab6d41168972ff5f06408c27b2160762b1279b7509fb5fe4fa6d2f20048ee173d220910fc71b96c78e18c9f9bedc4d1a9af7107c0c45be31c5d750ec5d0a32bf70e4a14062a0e11f891add139536d34d9a5c9329d44576db6700e6b3c15f35c9b5c4fffee580baf0020498f79abee4", 0xa3, 0xc800, &(0x7f0000000a80)={0xa, 0x4e20, 0x7, @loopback, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000ac0)={r6, 0x9feb}, 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000b00)={0x4, 0x80, 0x2, @local, 'irlan0\x00'}) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000b40)) 23:11:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:31 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:31 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xf4a5ddd0217ee3a6}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{0x2, 0x2, 0x81, 0x2}, 0x4, 0x3, 0x0, 0x0, "963a6ddd8a7bbdca"}, 0x10}, 0x1, 0x0, 0x0, 0x8001}, 0x80) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000340)=0x78) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000380)={0x1, [0xffffffffffffff99]}, 0x6) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e20, 0x3f, @local, 0x9}}, 0x10000, 0x7, 0x80a, 0x0, 0x18}, &(0x7f0000000480)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000004c0)={r3, 0xdc66}, 0x8) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000500)={'batadv0\x00', @ifru_names='vlan0\x00'}) socket$pppoe(0x18, 0x1, 0x0) getsockname$llc(r0, &(0x7f0000000540)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000580)=0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000005c0)={0x80000000, {{0x2, 0x4e22, @empty}}}, 0x88) r4 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000006c0)={'syz', 0x1}, &(0x7f0000000700)="3c492951f05c275efd13065291c61508272435a8d2281ad1a605a6eda6e06ab62b3ea29117b26b2a9f8fa3b9aeb41d3686d14fc337a06f3ec915f018b48a547c3b04c359b2a926a48e2f2172c0559d91621db5a58613a1ac05cdcda3056f5b18572762d3ccbb4336fb3f41277d6843a7db267ee0fbfbabe6ed9d790d2ec48eb2cd595df4c8087fcd68e18dd2c97bedee998566e2c546c6aa812e88d71f20be382f1cea8a03a7c114a2a8cf1199a54ac29a07267e85606ff5fbd4cbeb43068551b3af3ba55d977fd1c9052a43c8f60ff412", 0xd1, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000800)=[@sack_perm, @timestamp, @timestamp], 0x3) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000880)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x28, r5, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x28}}, 0x40004) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000980)={{0xffffffffffffffff, 0x0, 0xc, 0x3, 0x7}}) bind$alg(r0, &(0x7f00000009c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) prctl$PR_GET_THP_DISABLE(0x2a) r6 = socket$pppoe(0x18, 0x1, 0x0) mkdir(&(0x7f0000000a40)='./file0\x00', 0x80) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000a80)={r2, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000ac0)={r2, 0x1, 0x6, @dev={[], 0x1d}}, 0x10) sysfs$2(0x2, 0x80000001, &(0x7f0000000b00)=""/38) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000b40)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000c40)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in=@empty, 0x4e20, 0x0, 0x4e21, 0x7, 0x2, 0xa0, 0x80, 0xbf, r2, r7}, {0x4, 0x80000001, 0xffffffff, 0x7fff, 0x7085, 0xfffffffffffffff8, 0x7, 0xffffffff}, {0x0, 0x9b, 0x7fffffff, 0x401}, 0x4, 0x6e6bb9, 0x1, 0x1, 0x3}, {{@in6=@mcast2, 0x4d3, 0x3c}, 0xa, @in=@empty, 0x0, 0x0, 0x3, 0x1, 0x3, 0x5, 0x2}}, 0xe8) connect(r0, &(0x7f0000000d80)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x8010008}, 0x80) 23:11:31 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:31 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:31 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:32 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:32 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) sendto$inet6(r2, &(0x7f00000009c0)="40a8e051dfa9eed2428cac95b41557375d7708db8e719ec217af4a574cd7074fa5734725107f88c7b505c5687531709dd951c31cab6d41168972ff5f06408c27b2160762b1279b7509fb5fe4fa6d2f20048ee173d220910fc71b96c78e18c9f9bedc4d1a9af7107c0c45be31c5d750ec5d0a32bf70e4a14062a0e11f891add139536d34d9a5c9329d44576db6700e6b3c15f35c9b5c4fffee580baf0020498f79abee4", 0xa3, 0xc800, &(0x7f0000000a80)={0xa, 0x4e20, 0x7, @loopback, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000ac0)={r6, 0x9feb}, 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000b00)={0x4, 0x80, 0x2, @local, 'irlan0\x00'}) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000b40)) 23:11:32 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:32 executing program 1 (fault-call:7 fault-nth:0): mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:32 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 570.682672][T13642] FAULT_INJECTION: forcing a failure. [ 570.682672][T13642] name failslab, interval 1, probability 0, space 0, times 1 [ 570.697199][T13642] CPU: 1 PID: 13642 Comm: syz-executor.1 Not tainted 5.2.0+ #29 [ 570.704875][T13642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.714928][T13642] Call Trace: [ 570.715075][T13642] dump_stack+0x1d8/0x2f8 [ 570.715131][T13642] should_fail+0x608/0x860 [ 570.722698][T13642] ? setup_fault_attr+0x2b0/0x2b0 [ 570.722762][T13642] __should_failslab+0x11a/0x160 [ 570.722818][T13642] ? getname_flags+0xba/0x640 [ 570.741859][T13642] should_failslab+0x9/0x20 [ 570.746417][T13642] kmem_cache_alloc+0x56/0x2e0 [ 570.751204][T13642] getname_flags+0xba/0x640 [ 570.755716][T13642] getname+0x19/0x20 [ 570.759681][T13642] do_sys_open+0x2fc/0x620 [ 570.764105][T13642] ? file_open_root+0x440/0x440 [ 570.768978][T13642] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 570.775125][T13642] ? check_preemption_disabled+0xb7/0x2a0 [ 570.781035][T13642] ? prepare_exit_to_usermode+0x1f7/0x580 [ 570.786852][T13642] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.792381][T13642] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 570.798118][T13642] __x64_sys_openat+0xa2/0xb0 [ 570.802810][T13642] do_syscall_64+0xfe/0x140 [ 570.807628][T13642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.813527][T13642] RIP: 0033:0x459819 [ 570.817425][T13642] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.837205][T13642] RSP: 002b:00007fba3aef2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 570.845715][T13642] RAX: ffffffffffffffda RBX: 00007fba3aef2c90 RCX: 0000000000459819 [ 570.853695][T13642] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 570.861655][T13642] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.869611][T13642] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba3aef36d4 [ 570.877567][T13642] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 [ 571.470568][T13649] IPVS: ftp: loaded support on port[0] = 21 [ 571.593098][T13649] chnl_net:caif_netlink_parms(): no params data found [ 571.632317][T13649] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.640729][T13649] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.649043][T13649] device bridge_slave_0 entered promiscuous mode [ 571.657590][T13649] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.665202][T13649] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.673429][T13649] device bridge_slave_1 entered promiscuous mode [ 571.693232][T13649] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 571.704019][T13649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 571.722614][T13649] team0: Port device team_slave_0 added [ 571.729851][T13649] team0: Port device team_slave_1 added [ 571.846695][T13649] device hsr_slave_0 entered promiscuous mode [ 571.889838][T13649] device hsr_slave_1 entered promiscuous mode [ 571.953425][T13649] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.960579][T13649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.967987][T13649] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.975169][T13649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.033217][ T8156] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.042321][ T8156] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.066227][T13649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 572.079573][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 572.088174][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.102651][T13649] 8021q: adding VLAN 0 to HW filter on device team0 [ 572.112207][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 572.121107][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.129572][ T8156] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.136722][ T8156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.150770][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 572.159544][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.168060][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.175178][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.187225][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 572.205250][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 572.213981][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 572.223014][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 572.231402][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 572.240593][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 572.249035][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 572.257659][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.266201][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 572.275739][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 572.285289][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.302010][T13649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 572.333096][T13649] 8021q: adding VLAN 0 to HW filter on device batadv0 23:11:34 executing program 0 (fault-call:6 fault-nth:0): mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:34 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:34 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) sendto$inet6(r2, &(0x7f00000009c0)="40a8e051dfa9eed2428cac95b41557375d7708db8e719ec217af4a574cd7074fa5734725107f88c7b505c5687531709dd951c31cab6d41168972ff5f06408c27b2160762b1279b7509fb5fe4fa6d2f20048ee173d220910fc71b96c78e18c9f9bedc4d1a9af7107c0c45be31c5d750ec5d0a32bf70e4a14062a0e11f891add139536d34d9a5c9329d44576db6700e6b3c15f35c9b5c4fffee580baf0020498f79abee4", 0xa3, 0xc800, &(0x7f0000000a80)={0xa, 0x4e20, 0x7, @loopback, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000ac0)={r6, 0x9feb}, 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000b00)={0x4, 0x80, 0x2, @local, 'irlan0\x00'}) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000b40)) 23:11:34 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:34 executing program 1 (fault-call:7 fault-nth:1): mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:34 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:34 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 572.571206][T13666] FAULT_INJECTION: forcing a failure. [ 572.571206][T13666] name failslab, interval 1, probability 0, space 0, times 0 [ 572.656606][T13666] CPU: 0 PID: 13666 Comm: syz-executor.0 Not tainted 5.2.0+ #29 [ 572.664298][T13666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.674370][T13666] Call Trace: [ 572.677682][T13666] dump_stack+0x1d8/0x2f8 [ 572.682032][T13666] should_fail+0x608/0x860 [ 572.686468][T13666] ? setup_fault_attr+0x2b0/0x2b0 [ 572.691508][T13666] __should_failslab+0x11a/0x160 [ 572.696435][T13666] ? getname_flags+0xba/0x640 [ 572.696446][T13666] should_failslab+0x9/0x20 [ 572.696457][T13666] kmem_cache_alloc+0x56/0x2e0 [ 572.696468][T13666] getname_flags+0xba/0x640 [ 572.696481][T13666] getname+0x19/0x20 [ 572.696491][T13666] do_sys_open+0x2fc/0x620 [ 572.696501][T13666] ? file_open_root+0x440/0x440 [ 572.696510][T13666] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 572.696522][T13666] ? prepare_exit_to_usermode+0x1f7/0x580 [ 572.696534][T13666] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 572.745256][T13666] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 572.750990][T13666] __x64_sys_openat+0xa2/0xb0 23:11:34 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:34 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 572.755681][T13666] do_syscall_64+0xfe/0x140 [ 572.760189][T13666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.766066][T13666] RIP: 0033:0x459819 [ 572.766076][T13666] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 572.766081][T13666] RSP: 002b:00007f2fdfd44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 572.766095][T13666] RAX: ffffffffffffffda RBX: 00007f2fdfd44c90 RCX: 0000000000459819 23:11:34 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 572.766100][T13666] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 572.766105][T13666] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.766114][T13666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fdfd456d4 [ 572.789577][T13666] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 23:11:34 executing program 0 (fault-call:6 fault-nth:1): mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:34 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 573.094004][T13694] FAULT_INJECTION: forcing a failure. [ 573.094004][T13694] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 573.107429][T13694] CPU: 1 PID: 13694 Comm: syz-executor.0 Not tainted 5.2.0+ #29 [ 573.115064][T13694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.125128][T13694] Call Trace: [ 573.128441][T13694] dump_stack+0x1d8/0x2f8 [ 573.132793][T13694] should_fail+0x608/0x860 [ 573.137202][T13694] ? setup_fault_attr+0x2b0/0x2b0 [ 573.137215][T13694] ? trace_hardirqs_on_caller+0x74/0x80 [ 573.137229][T13694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 573.137276][T13694] should_fail_alloc_page+0x55/0x60 [ 573.137335][T13694] prepare_alloc_pages+0x283/0x460 [ 573.158581][T13694] __alloc_pages_nodemask+0x11c/0x790 [ 573.169115][T13694] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 573.174427][T13694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 573.179894][T13694] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 573.185448][T13694] ? trace_hardirqs_on_caller+0x74/0x80 [ 573.191019][T13694] kmem_getpages+0x4d/0xa00 [ 573.195526][T13694] cache_grow_begin+0x7e/0x2c0 [ 573.200377][T13694] cache_alloc_refill+0x311/0x3f0 [ 573.205403][T13694] ? check_preemption_disabled+0xb7/0x2a0 [ 573.211145][T13694] kmem_cache_alloc+0x2b9/0x2e0 [ 573.215992][T13694] ? getname_flags+0xba/0x640 [ 573.220761][T13694] getname_flags+0xba/0x640 [ 573.225267][T13694] getname+0x19/0x20 [ 573.229242][T13694] do_sys_open+0x2fc/0x620 [ 573.233657][T13694] ? file_open_root+0x440/0x440 [ 573.238501][T13694] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 573.244625][T13694] ? prepare_exit_to_usermode+0x1f7/0x580 [ 573.250966][T13694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 573.256415][T13694] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 573.262142][T13694] __x64_sys_openat+0xa2/0xb0 [ 573.266820][T13694] do_syscall_64+0xfe/0x140 [ 573.271314][T13694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.277193][T13694] RIP: 0033:0x459819 [ 573.281075][T13694] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 573.300667][T13694] RSP: 002b:00007f2fdfd44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 573.309073][T13694] RAX: ffffffffffffffda RBX: 00007f2fdfd44c90 RCX: 0000000000459819 [ 573.317036][T13694] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 573.324996][T13694] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.333045][T13694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fdfd456d4 [ 573.341012][T13694] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 [ 573.956680][T13700] IPVS: ftp: loaded support on port[0] = 21 [ 574.175834][T13700] chnl_net:caif_netlink_parms(): no params data found [ 574.186717][T13702] IPVS: ftp: loaded support on port[0] = 21 [ 574.352759][T13700] bridge0: port 1(bridge_slave_0) entered blocking state [ 574.360025][T13700] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.370980][T13700] device bridge_slave_0 entered promiscuous mode [ 574.501695][T13700] bridge0: port 2(bridge_slave_1) entered blocking state [ 574.509189][T13700] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.517347][T13700] device bridge_slave_1 entered promiscuous mode [ 574.656762][T13700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 574.668334][T13700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 574.691885][T13700] team0: Port device team_slave_0 added [ 574.701614][T13700] team0: Port device team_slave_1 added [ 574.916933][T13700] device hsr_slave_0 entered promiscuous mode [ 574.974510][T13700] device hsr_slave_1 entered promiscuous mode [ 575.024333][T13700] debugfs: Directory 'hsr0' with parent '/' already present! [ 575.035731][ T8073] device bridge_slave_1 left promiscuous mode [ 575.041921][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.105260][ T8073] device bridge_slave_0 left promiscuous mode [ 575.111465][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.166041][ T8073] device bridge_slave_1 left promiscuous mode [ 575.172306][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.215007][ T8073] device bridge_slave_0 left promiscuous mode [ 575.221192][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.464537][ T8073] device hsr_slave_0 left promiscuous mode [ 578.514374][ T8073] device hsr_slave_1 left promiscuous mode [ 578.560858][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 578.573670][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 578.585302][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 578.657888][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 578.747518][ T8073] bond0 (unregistering): Released all slaves [ 578.884970][ T8073] device hsr_slave_0 left promiscuous mode [ 578.934506][ T8073] device hsr_slave_1 left promiscuous mode [ 579.013171][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 579.027581][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 579.038041][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 579.079612][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 579.142307][ T8073] bond0 (unregistering): Released all slaves [ 579.249575][T13702] chnl_net:caif_netlink_parms(): no params data found [ 579.285080][T13702] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.292247][T13702] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.300157][T13702] device bridge_slave_0 entered promiscuous mode [ 579.308721][T13702] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.316332][T13702] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.324649][T13702] device bridge_slave_1 entered promiscuous mode [ 579.342456][T13702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 579.366328][T13702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 579.392008][T13702] team0: Port device team_slave_0 added [ 579.400270][T13702] team0: Port device team_slave_1 added [ 579.466434][T13702] device hsr_slave_0 entered promiscuous mode [ 579.514616][T13702] device hsr_slave_1 entered promiscuous mode [ 579.574249][T13702] debugfs: Directory 'hsr0' with parent '/' already present! [ 579.591429][T13700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 579.608244][T13700] 8021q: adding VLAN 0 to HW filter on device team0 [ 579.619269][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 579.627100][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 579.659878][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 579.668943][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 579.677420][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.684638][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.692665][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 579.701786][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 579.710259][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.717374][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.725603][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 579.734301][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 579.742881][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 579.751586][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 579.760437][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 579.769384][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 579.778254][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 579.786767][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 579.796488][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 579.804994][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 579.815933][T13700] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 579.830449][T13700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 579.842054][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 579.850799][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 579.868849][T13700] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 579.989273][T13702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 580.041724][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 580.061551][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 580.083111][T13702] 8021q: adding VLAN 0 to HW filter on device team0 [ 580.100683][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 580.111900][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 580.119085][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 580.144305][T13712] FAULT_INJECTION: forcing a failure. [ 580.144305][T13712] name failslab, interval 1, probability 0, space 0, times 0 [ 580.149236][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 580.166800][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 580.176275][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 580.183394][T13366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 580.184610][T13712] CPU: 1 PID: 13712 Comm: syz-executor.1 Not tainted 5.2.0+ #29 [ 580.198665][T13712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.208737][T13712] Call Trace: [ 580.208819][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 580.212128][T13712] dump_stack+0x1d8/0x2f8 [ 580.221431][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 580.224247][T13712] should_fail+0x608/0x860 [ 580.224259][T13712] ? setup_fault_attr+0x2b0/0x2b0 [ 580.224276][T13712] __should_failslab+0x11a/0x160 [ 580.224288][T13712] ? __alloc_file+0x29/0x350 [ 580.224299][T13712] should_failslab+0x9/0x20 [ 580.224308][T13712] kmem_cache_alloc+0x56/0x2e0 [ 580.224385][T13712] ? stack_trace_save+0x1e0/0x1e0 [ 580.224399][T13712] __alloc_file+0x29/0x350 [ 580.236851][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 580.237863][T13712] ? alloc_empty_file+0x4c/0x1b0 [ 580.243448][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 580.247832][T13712] alloc_empty_file+0xac/0x1b0 [ 580.247846][T13712] path_openat+0x12b/0x4400 [ 580.247867][T13712] ? trace_lock_acquire+0x1d0/0x1d0 [ 580.247884][T13712] ? __kasan_check_write+0x14/0x20 [ 580.247894][T13712] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 580.247909][T13712] ? do_filp_open+0x430/0x430 [ 580.247918][T13712] ? __kasan_kmalloc+0x178/0x1b0 [ 580.247928][T13712] ? __kasan_kmalloc+0x11c/0x1b0 [ 580.247934][T13712] ? kasan_slab_alloc+0xf/0x20 [ 580.247943][T13712] ? kmem_cache_alloc+0x1f5/0x2e0 [ 580.247950][T13712] ? getname_flags+0xba/0x640 [ 580.247962][T13712] ? getname+0x19/0x20 [ 580.258915][T13702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 580.261816][T13712] ? do_sys_open+0x2fc/0x620 [ 580.269111][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 580.271230][T13712] ? __x64_sys_openat+0xa2/0xb0 [ 580.271243][T13712] ? do_syscall_64+0xfe/0x140 [ 580.271254][T13712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.271270][T13712] ? refcount_dec_and_test_checked+0x1a/0x20 [ 580.293136][T13702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 580.296520][T13712] ? proc_fail_nth_write+0x179/0x1f0 [ 580.296547][T13712] do_filp_open+0x1f7/0x430 [ 580.296560][T13712] ? vfs_tmpfile+0x230/0x230 [ 580.296571][T13712] ? __lock_acquire+0x4750/0x4750 [ 580.296585][T13712] ? do_raw_spin_unlock+0x49/0x260 [ 580.296600][T13712] ? _raw_spin_unlock+0x2c/0x50 [ 580.296627][T13712] ? __alloc_fd+0x58f/0x630 [ 580.296642][T13712] ? get_unused_fd_flags+0x97/0xb0 [ 580.296654][T13712] do_sys_open+0x343/0x620 [ 580.296663][T13712] ? file_open_root+0x440/0x440 [ 580.296674][T13712] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 580.296689][T13712] ? prepare_exit_to_usermode+0x1f7/0x580 [ 580.296718][T13712] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 580.296728][T13712] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 580.296739][T13712] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 580.296752][T13712] __x64_sys_openat+0xa2/0xb0 [ 580.296763][T13712] do_syscall_64+0xfe/0x140 [ 580.296777][T13712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.296788][T13712] RIP: 0033:0x459819 [ 580.296798][T13712] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 580.296802][T13712] RSP: 002b:00007f1c55d69c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 580.296811][T13712] RAX: ffffffffffffffda RBX: 00007f1c55d69c90 RCX: 0000000000459819 [ 580.296816][T13712] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 580.296827][T13712] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 580.306518][T13712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c55d6a6d4 [ 580.306524][T13712] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 23:11:42 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) sendto$inet6(r2, &(0x7f00000009c0)="40a8e051dfa9eed2428cac95b41557375d7708db8e719ec217af4a574cd7074fa5734725107f88c7b505c5687531709dd951c31cab6d41168972ff5f06408c27b2160762b1279b7509fb5fe4fa6d2f20048ee173d220910fc71b96c78e18c9f9bedc4d1a9af7107c0c45be31c5d750ec5d0a32bf70e4a14062a0e11f891add139536d34d9a5c9329d44576db6700e6b3c15f35c9b5c4fffee580baf0020498f79abee4", 0xa3, 0xc800, &(0x7f0000000a80)={0xa, 0x4e20, 0x7, @loopback, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000ac0)={r6, 0x9feb}, 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000b00)={0x4, 0x80, 0x2, @local, 'irlan0\x00'}) 23:11:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:42 executing program 0 (fault-call:6 fault-nth:2): mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:42 executing program 1 (fault-call:7 fault-nth:2): mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 581.103802][T13728] FAULT_INJECTION: forcing a failure. [ 581.103802][T13728] name failslab, interval 1, probability 0, space 0, times 0 [ 581.129742][T13728] CPU: 1 PID: 13728 Comm: syz-executor.0 Not tainted 5.2.0+ #29 [ 581.137437][T13728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.147505][T13728] Call Trace: [ 581.150838][T13728] dump_stack+0x1d8/0x2f8 [ 581.155213][T13728] should_fail+0x608/0x860 [ 581.159669][T13728] ? setup_fault_attr+0x2b0/0x2b0 [ 581.164756][T13728] __should_failslab+0x11a/0x160 [ 581.169725][T13728] ? __alloc_file+0x29/0x350 [ 581.174348][T13728] should_failslab+0x9/0x20 [ 581.178887][T13728] kmem_cache_alloc+0x56/0x2e0 [ 581.183686][T13728] ? stack_trace_save+0x1e0/0x1e0 [ 581.188740][T13728] __alloc_file+0x29/0x350 [ 581.193191][T13728] ? alloc_empty_file+0x4c/0x1b0 [ 581.198158][T13728] alloc_empty_file+0xac/0x1b0 [ 581.202958][T13728] path_openat+0x12b/0x4400 [ 581.207505][T13728] ? mark_lock+0x152/0x1850 [ 581.212044][T13728] ? check_preemption_disabled+0x47/0x2a0 [ 581.217889][T13728] ? do_filp_open+0x430/0x430 [ 581.222599][T13728] ? __kasan_kmalloc+0x178/0x1b0 [ 581.227570][T13728] ? __kasan_kmalloc+0x11c/0x1b0 [ 581.232711][T13728] ? kasan_slab_alloc+0xf/0x20 [ 581.237509][T13728] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 581.242838][T13728] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 581.248342][T13728] do_filp_open+0x1f7/0x430 [ 581.252882][T13728] ? vfs_tmpfile+0x230/0x230 [ 581.257498][T13728] ? __lock_acquire+0x4750/0x4750 [ 581.262553][T13728] ? do_raw_spin_unlock+0x49/0x260 [ 581.267689][T13728] ? _raw_spin_unlock+0x2c/0x50 [ 581.272563][T13728] ? __alloc_fd+0x58f/0x630 [ 581.277102][T13728] ? get_unused_fd_flags+0x97/0xb0 [ 581.282237][T13728] do_sys_open+0x343/0x620 [ 581.286689][T13728] ? file_open_root+0x440/0x440 [ 581.291566][T13728] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 581.297664][T13728] ? prepare_exit_to_usermode+0x1f7/0x580 [ 581.303426][T13728] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 581.308916][T13728] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 581.314657][T13728] __x64_sys_openat+0xa2/0xb0 [ 581.319361][T13728] do_syscall_64+0xfe/0x140 [ 581.323902][T13728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.329845][T13728] RIP: 0033:0x459819 [ 581.333753][T13728] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:11:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:43 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:43 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:43 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 581.353371][T13728] RSP: 002b:00007f2fdfd44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 581.361817][T13728] RAX: ffffffffffffffda RBX: 00007f2fdfd44c90 RCX: 0000000000459819 [ 581.369814][T13728] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 581.377911][T13728] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 581.385900][T13728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fdfd456d4 [ 581.393904][T13728] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 23:11:43 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) sendto$inet6(r2, &(0x7f00000009c0)="40a8e051dfa9eed2428cac95b41557375d7708db8e719ec217af4a574cd7074fa5734725107f88c7b505c5687531709dd951c31cab6d41168972ff5f06408c27b2160762b1279b7509fb5fe4fa6d2f20048ee173d220910fc71b96c78e18c9f9bedc4d1a9af7107c0c45be31c5d750ec5d0a32bf70e4a14062a0e11f891add139536d34d9a5c9329d44576db6700e6b3c15f35c9b5c4fffee580baf0020498f79abee4", 0xa3, 0xc800, &(0x7f0000000a80)={0xa, 0x4e20, 0x7, @loopback, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000ac0)={r6, 0x9feb}, 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000b00)={0x4, 0x80, 0x2, @local, 'irlan0\x00'}) 23:11:43 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:43 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:43 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:43 executing program 0 (fault-call:6 fault-nth:3): mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 581.790390][T13768] FAULT_INJECTION: forcing a failure. [ 581.790390][T13768] name failslab, interval 1, probability 0, space 0, times 0 [ 581.811623][T13768] CPU: 1 PID: 13768 Comm: syz-executor.0 Not tainted 5.2.0+ #29 [ 581.819314][T13768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.829387][T13768] Call Trace: [ 581.832676][T13768] dump_stack+0x1d8/0x2f8 [ 581.836996][T13768] should_fail+0x608/0x860 [ 581.841394][T13768] ? setup_fault_attr+0x2b0/0x2b0 [ 581.846498][T13768] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 581.852209][T13768] __should_failslab+0x11a/0x160 [ 581.857131][T13768] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 581.862834][T13768] should_failslab+0x9/0x20 [ 581.867333][T13768] __kmalloc+0x7a/0x340 [ 581.871466][T13768] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 581.877171][T13768] tomoyo_realpath_from_path+0xdc/0x7c0 [ 581.882718][T13768] tomoyo_check_open_permission+0x1f2/0x9e0 [ 581.888690][T13768] ? tomoyo_check_path_number_acl+0x240/0x240 [ 581.894799][T13768] ? smk_access+0x4f0/0x4f0 [ 581.899330][T13768] ? lockref_get+0x15/0x60 [ 581.903731][T13768] tomoyo_file_open+0x141/0x190 [ 581.908594][T13768] security_file_open+0x65/0x2f0 [ 581.913516][T13768] do_dentry_open+0x397/0x1060 [ 581.918265][T13768] ? do_raw_spin_unlock+0x49/0x260 [ 581.923384][T13768] ? finish_open+0xe0/0xe0 [ 581.927877][T13768] ? vfs_open+0x2f/0x80 [ 581.932034][T13768] vfs_open+0x73/0x80 [ 581.935998][T13768] path_openat+0x136d/0x4400 [ 581.940575][T13768] ? mark_lock+0x152/0x1850 [ 581.945072][T13768] ? do_filp_open+0x430/0x430 [ 581.949728][T13768] ? __kasan_kmalloc+0x178/0x1b0 [ 581.954656][T13768] ? __kasan_kmalloc+0x11c/0x1b0 [ 581.959575][T13768] ? kasan_slab_alloc+0xf/0x20 [ 581.964320][T13768] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 581.969586][T13768] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 581.975059][T13768] do_filp_open+0x1f7/0x430 [ 581.979553][T13768] ? vfs_tmpfile+0x230/0x230 [ 581.984128][T13768] ? do_raw_spin_unlock+0x49/0x260 [ 581.989239][T13768] ? _raw_spin_unlock+0x2c/0x50 [ 581.994069][T13768] ? __alloc_fd+0x58f/0x630 [ 581.998559][T13768] ? get_unused_fd_flags+0x97/0xb0 [ 582.003651][T13768] do_sys_open+0x343/0x620 [ 582.008050][T13768] ? file_open_root+0x440/0x440 [ 582.012902][T13768] ? check_preemption_disabled+0xb7/0x2a0 [ 582.018603][T13768] ? prepare_exit_to_usermode+0x1f7/0x580 [ 582.024307][T13768] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 582.029835][T13768] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 582.035552][T13768] __x64_sys_openat+0xa2/0xb0 [ 582.040215][T13768] do_syscall_64+0xfe/0x140 [ 582.044705][T13768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.050594][T13768] RIP: 0033:0x459819 [ 582.054470][T13768] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 582.074150][T13768] RSP: 002b:00007f2fdfd44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 582.082546][T13768] RAX: ffffffffffffffda RBX: 00007f2fdfd44c90 RCX: 0000000000459819 [ 582.090507][T13768] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 582.098462][T13768] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 582.106417][T13768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fdfd456d4 [ 582.114386][T13768] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 [ 582.142176][T13768] ERROR: Out of memory at tomoyo_realpath_from_path. [ 582.399181][T13772] IPVS: ftp: loaded support on port[0] = 21 [ 582.468403][T13772] chnl_net:caif_netlink_parms(): no params data found [ 582.498155][T13772] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.506326][T13772] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.514402][T13772] device bridge_slave_0 entered promiscuous mode [ 582.523765][T13772] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.530970][T13772] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.538976][T13772] device bridge_slave_1 entered promiscuous mode [ 582.560314][T13772] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 582.573131][T13772] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 582.597860][T13772] team0: Port device team_slave_0 added [ 582.606346][T13772] team0: Port device team_slave_1 added [ 582.656073][T13772] device hsr_slave_0 entered promiscuous mode [ 582.704608][T13772] device hsr_slave_1 entered promiscuous mode [ 582.744394][T13772] debugfs: Directory 'hsr0' with parent '/' already present! [ 582.877577][T13772] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.884866][T13772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 582.892158][T13772] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.899267][T13772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 582.990893][T13772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 583.002738][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 583.011895][ T8156] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.020459][ T8156] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.028797][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 583.098958][T13772] 8021q: adding VLAN 0 to HW filter on device team0 [ 583.111114][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 583.119721][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.126831][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 583.137681][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 583.147941][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.155073][T13366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 583.236839][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 583.245525][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 583.259556][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 583.331705][T13772] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 583.342863][T13772] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 583.355368][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 583.363824][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 583.372715][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 583.449722][T13772] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 583.656150][T13780] FAULT_INJECTION: forcing a failure. [ 583.656150][T13780] name failslab, interval 1, probability 0, space 0, times 0 [ 583.675492][T13780] CPU: 1 PID: 13780 Comm: syz-executor.1 Not tainted 5.2.0+ #29 [ 583.683158][T13780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.693205][T13780] Call Trace: [ 583.693234][T13780] dump_stack+0x1d8/0x2f8 [ 583.693251][T13780] should_fail+0x608/0x860 [ 583.693262][T13780] ? setup_fault_attr+0x2b0/0x2b0 [ 583.693278][T13780] __should_failslab+0x11a/0x160 [ 583.693289][T13780] ? __alloc_file+0x29/0x350 [ 583.693301][T13780] should_failslab+0x9/0x20 [ 583.693310][T13780] kmem_cache_alloc+0x56/0x2e0 [ 583.693323][T13780] __alloc_file+0x29/0x350 [ 583.693330][T13780] ? alloc_empty_file+0x4c/0x1b0 [ 583.693340][T13780] alloc_empty_file+0xac/0x1b0 [ 583.693354][T13780] path_openat+0x12b/0x4400 [ 583.701058][T13780] ? __lock_acquire+0x4750/0x4750 [ 583.710458][T13780] ? _raw_spin_unlock_irq+0x27/0x80 [ 583.719938][T13780] ? trace_lock_acquire+0x1d0/0x1d0 [ 583.729173][T13780] ? __kasan_check_read+0x11/0x20 [ 583.738464][T13780] ? mark_lock+0x152/0x1850 [ 583.738542][T13780] ? finish_lock_switch+0x31/0x40 [ 583.738578][T13780] ? finish_task_switch+0x251/0x550 [ 583.747809][T13780] ? __bfs+0x560/0x560 [ 583.747823][T13780] ? do_filp_open+0x430/0x430 [ 583.747839][T13780] ? __schedule+0x677/0x9f0 [ 583.758030][T13780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.758055][T13780] do_filp_open+0x1f7/0x430 [ 583.758067][T13780] ? vfs_tmpfile+0x230/0x230 [ 583.758076][T13780] ? __lock_acquire+0x4750/0x4750 [ 583.758091][T13780] ? do_raw_spin_unlock+0x49/0x260 [ 583.758103][T13780] ? _raw_spin_unlock+0x2c/0x50 [ 583.758112][T13780] ? __alloc_fd+0x58f/0x630 [ 583.758127][T13780] ? get_unused_fd_flags+0x97/0xb0 [ 583.758140][T13780] do_sys_open+0x343/0x620 [ 583.768334][T13780] ? file_open_root+0x440/0x440 [ 583.768347][T13780] ? check_preemption_disabled+0xb7/0x2a0 [ 583.768358][T13780] ? prepare_exit_to_usermode+0x1f7/0x580 23:11:45 executing program 1 (fault-call:7 fault-nth:3): mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:45 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:45 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:45 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) sendto$inet6(r2, &(0x7f00000009c0)="40a8e051dfa9eed2428cac95b41557375d7708db8e719ec217af4a574cd7074fa5734725107f88c7b505c5687531709dd951c31cab6d41168972ff5f06408c27b2160762b1279b7509fb5fe4fa6d2f20048ee173d220910fc71b96c78e18c9f9bedc4d1a9af7107c0c45be31c5d750ec5d0a32bf70e4a14062a0e11f891add139536d34d9a5c9329d44576db6700e6b3c15f35c9b5c4fffee580baf0020498f79abee4", 0xa3, 0xc800, &(0x7f0000000a80)={0xa, 0x4e20, 0x7, @loopback, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000ac0)={r6, 0x9feb}, 0x8) keyctl$set_reqkey_keyring(0xe, 0x0) 23:11:45 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:45 executing program 0 (fault-call:6 fault-nth:4): mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 583.768368][T13780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.768382][T13780] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 583.777861][T13780] __x64_sys_openat+0xa2/0xb0 [ 583.777874][T13780] do_syscall_64+0xfe/0x140 [ 583.777888][T13780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.777898][T13780] RIP: 0033:0x459819 [ 583.777908][T13780] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 583.777914][T13780] RSP: 002b:00007f89652d8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 583.777926][T13780] RAX: ffffffffffffffda RBX: 00007f89652d8c90 RCX: 0000000000459819 [ 583.787434][T13780] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 583.787440][T13780] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 583.787445][T13780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89652d96d4 [ 583.787450][T13780] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 23:11:45 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 583.931226][T13790] FAULT_INJECTION: forcing a failure. [ 583.931226][T13790] name failslab, interval 1, probability 0, space 0, times 0 23:11:45 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:45 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:45 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:45 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) sendto$inet6(r2, &(0x7f00000009c0)="40a8e051dfa9eed2428cac95b41557375d7708db8e719ec217af4a574cd7074fa5734725107f88c7b505c5687531709dd951c31cab6d41168972ff5f06408c27b2160762b1279b7509fb5fe4fa6d2f20048ee173d220910fc71b96c78e18c9f9bedc4d1a9af7107c0c45be31c5d750ec5d0a32bf70e4a14062a0e11f891add139536d34d9a5c9329d44576db6700e6b3c15f35c9b5c4fffee580baf0020498f79abee4", 0xa3, 0xc800, &(0x7f0000000a80)={0xa, 0x4e20, 0x7, @loopback, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000ac0)={r6, 0x9feb}, 0x8) [ 584.163999][T13790] CPU: 1 PID: 13790 Comm: syz-executor.0 Not tainted 5.2.0+ #29 [ 584.171724][T13790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.181908][T13790] Call Trace: [ 584.185217][T13790] dump_stack+0x1d8/0x2f8 [ 584.189550][T13790] should_fail+0x608/0x860 [ 584.194044][T13790] ? setup_fault_attr+0x2b0/0x2b0 [ 584.199062][T13790] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 584.205308][T13790] __should_failslab+0x11a/0x160 [ 584.210260][T13790] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 584.216591][T13790] should_failslab+0x9/0x20 [ 584.221527][T13790] __kmalloc+0x7a/0x340 [ 584.225698][T13790] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 584.231416][T13790] tomoyo_realpath_from_path+0xdc/0x7c0 [ 584.236990][T13790] tomoyo_check_open_permission+0x1f2/0x9e0 [ 584.242876][T13790] ? trace_lock_acquire+0x1d0/0x1d0 [ 584.248074][T13790] ? tomoyo_check_path_number_acl+0x240/0x240 [ 584.254143][T13790] ? smk_access+0x4f0/0x4f0 [ 584.258676][T13790] tomoyo_file_open+0x141/0x190 [ 584.263526][T13790] security_file_open+0x65/0x2f0 [ 584.268494][T13790] do_dentry_open+0x397/0x1060 [ 584.273259][T13790] ? do_raw_spin_unlock+0x49/0x260 [ 584.278376][T13790] ? finish_open+0xe0/0xe0 [ 584.282787][T13790] ? vfs_open+0x2f/0x80 [ 584.287189][T13790] vfs_open+0x73/0x80 [ 584.291165][T13790] path_openat+0x136d/0x4400 [ 584.295784][T13790] ? do_filp_open+0x430/0x430 [ 584.300452][T13790] ? __kasan_kmalloc+0x178/0x1b0 [ 584.305388][T13790] ? __kasan_kmalloc+0x11c/0x1b0 [ 584.310320][T13790] ? kasan_slab_alloc+0xf/0x20 [ 584.315249][T13790] ? kmem_cache_alloc+0x1f5/0x2e0 [ 584.321664][T13790] ? getname_flags+0xba/0x640 [ 584.326341][T13790] ? getname+0x19/0x20 [ 584.330406][T13790] ? do_sys_open+0x2fc/0x620 [ 584.334995][T13790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 584.340466][T13790] do_filp_open+0x1f7/0x430 [ 584.344985][T13790] ? vfs_tmpfile+0x230/0x230 [ 584.349672][T13790] ? do_raw_spin_unlock+0x49/0x260 [ 584.354894][T13790] ? _raw_spin_unlock+0x2c/0x50 [ 584.359753][T13790] ? __alloc_fd+0x58f/0x630 23:11:46 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) sendto$inet6(r2, &(0x7f00000009c0)="40a8e051dfa9eed2428cac95b41557375d7708db8e719ec217af4a574cd7074fa5734725107f88c7b505c5687531709dd951c31cab6d41168972ff5f06408c27b2160762b1279b7509fb5fe4fa6d2f20048ee173d220910fc71b96c78e18c9f9bedc4d1a9af7107c0c45be31c5d750ec5d0a32bf70e4a14062a0e11f891add139536d34d9a5c9329d44576db6700e6b3c15f35c9b5c4fffee580baf0020498f79abee4", 0xa3, 0xc800, &(0x7f0000000a80)={0xa, 0x4e20, 0x7, @loopback, 0x1}, 0x1c) [ 584.364342][T13790] ? get_unused_fd_flags+0x97/0xb0 [ 584.364353][T13790] do_sys_open+0x343/0x620 [ 584.364364][T13790] ? file_open_root+0x440/0x440 [ 584.364381][T13790] __x64_sys_openat+0xa2/0xb0 [ 584.364397][T13790] do_syscall_64+0xfe/0x140 [ 584.364411][T13790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 584.364421][T13790] RIP: 0033:0x459819 [ 584.364430][T13790] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 584.364434][T13790] RSP: 002b:00007f2fdfd44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 584.364443][T13790] RAX: ffffffffffffffda RBX: 00007f2fdfd44c90 RCX: 0000000000459819 [ 584.364448][T13790] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 584.364458][T13790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 584.442268][T13790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fdfd456d4 [ 584.458192][T13790] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 [ 584.484397][T13790] ERROR: Out of memory at tomoyo_realpath_from_path. 23:11:46 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:46 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r5, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r6}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r6, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) ioctl$VIDIOC_QUERYCTRL(r4, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:46 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:46 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:46 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:46 executing program 0 (fault-call:6 fault-nth:5): mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 584.670763][ T8073] device bridge_slave_1 left promiscuous mode [ 584.695479][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.712170][T13823] FAULT_INJECTION: forcing a failure. [ 584.712170][T13823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 584.725438][T13823] CPU: 1 PID: 13823 Comm: syz-executor.0 Not tainted 5.2.0+ #29 [ 584.733077][T13823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.743135][T13823] Call Trace: [ 584.746524][T13823] dump_stack+0x1d8/0x2f8 [ 584.750846][T13823] should_fail+0x608/0x860 [ 584.755251][T13823] ? setup_fault_attr+0x2b0/0x2b0 [ 584.760264][T13823] ? __kasan_check_read+0x11/0x20 [ 584.765276][T13823] should_fail_alloc_page+0x55/0x60 [ 584.770457][T13823] prepare_alloc_pages+0x283/0x460 [ 584.775724][T13823] __alloc_pages_nodemask+0x11c/0x790 [ 584.781085][T13823] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 584.786623][T13823] ? __bfs+0x560/0x560 [ 584.790668][T13823] ? __lock_acquire+0xd9a/0x4750 [ 584.795590][T13823] ? __kasan_check_read+0x11/0x20 [ 584.800601][T13823] kmem_getpages+0x4d/0xa00 [ 584.805085][T13823] cache_grow_begin+0x7e/0x2c0 [ 584.809832][T13823] cache_alloc_refill+0x311/0x3f0 [ 584.814836][T13823] ? check_preemption_disabled+0xb7/0x2a0 [ 584.820535][T13823] __kmalloc+0x318/0x340 [ 584.824775][T13823] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 584.830578][T13823] tomoyo_realpath_from_path+0xdc/0x7c0 [ 584.836110][T13823] tomoyo_check_open_permission+0x1f2/0x9e0 [ 584.842146][T13823] ? trace_lock_acquire+0x1d0/0x1d0 [ 584.847347][T13823] ? tomoyo_check_path_number_acl+0x240/0x240 [ 584.853506][T13823] ? smk_access+0x4f0/0x4f0 [ 584.858254][T13823] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 584.863931][T13823] ? retint_kernel+0x2b/0x2b [ 584.868504][T13823] ? security_file_open+0x71/0x2f0 [ 584.873597][T13823] tomoyo_file_open+0x141/0x190 [ 584.878429][T13823] security_file_open+0x65/0x2f0 [ 584.883437][T13823] do_dentry_open+0x397/0x1060 [ 584.888180][T13823] ? do_raw_spin_unlock+0x49/0x260 [ 584.893295][T13823] ? finish_open+0xe0/0xe0 [ 584.897698][T13823] ? vfs_open+0x2f/0x80 [ 584.902532][T13823] vfs_open+0x73/0x80 [ 584.906500][T13823] path_openat+0x136d/0x4400 [ 584.911076][T13823] ? mark_lock+0x152/0x1850 [ 584.915760][T13823] ? do_filp_open+0x430/0x430 [ 584.920419][T13823] ? __kasan_kmalloc+0x178/0x1b0 [ 584.925510][T13823] ? __kasan_kmalloc+0x11c/0x1b0 [ 584.930442][T13823] ? kasan_slab_alloc+0xf/0x20 [ 584.935186][T13823] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 584.940624][T13823] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 584.946074][T13823] do_filp_open+0x1f7/0x430 [ 584.950561][T13823] ? vfs_tmpfile+0x230/0x230 [ 584.955141][T13823] ? do_raw_spin_unlock+0x49/0x260 [ 584.960236][T13823] ? _raw_spin_unlock+0x2c/0x50 [ 584.965067][T13823] ? __alloc_fd+0x58f/0x630 [ 584.969556][T13823] ? get_unused_fd_flags+0x97/0xb0 [ 584.974649][T13823] do_sys_open+0x343/0x620 [ 584.979047][T13823] ? file_open_root+0x440/0x440 [ 584.983883][T13823] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 584.989379][T13823] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 584.995078][T13823] __x64_sys_openat+0xa2/0xb0 [ 584.999767][T13823] do_syscall_64+0xfe/0x140 [ 585.004269][T13823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.010228][T13823] RIP: 0033:0x459819 [ 585.014109][T13823] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 585.033697][T13823] RSP: 002b:00007f2fdfd44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 585.042091][T13823] RAX: ffffffffffffffda RBX: 00007f2fdfd44c90 RCX: 0000000000459819 [ 585.050043][T13823] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 585.058201][T13823] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:11:46 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:46 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 585.066153][T13823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fdfd456d4 [ 585.074105][T13823] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 23:11:46 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:46 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r4, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r5}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000008c0)={r5, 0x1c, "37c6974b65da48aa83df3fb5c3cd294444e06fecb8e633f788af34a8"}, &(0x7f0000000900)=0x24) [ 585.116575][ T8073] device bridge_slave_0 left promiscuous mode [ 585.131282][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:11:46 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:46 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:47 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = dup(r0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x8001, 0xfffffffffffeffff}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000040)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:47 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:47 executing program 0 (fault-call:6 fault-nth:6): mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:47 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:47 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r4, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r5}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000880)={0x1, 0x100}) 23:11:47 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 585.512871][T13854] FAULT_INJECTION: forcing a failure. [ 585.512871][T13854] name failslab, interval 1, probability 0, space 0, times 0 23:11:47 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:47 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:47 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r4, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r5}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r2, 0x1b, 0x1, 0xc557, &(0x7f0000000800)=[0x0], 0x1}, 0x20) 23:11:47 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 585.684298][T13854] CPU: 0 PID: 13854 Comm: syz-executor.0 Not tainted 5.2.0+ #29 [ 585.691996][T13854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.702079][T13854] Call Trace: [ 585.705385][T13854] dump_stack+0x1d8/0x2f8 [ 585.709735][T13854] should_fail+0x608/0x860 [ 585.714149][T13854] ? setup_fault_attr+0x2b0/0x2b0 [ 585.719177][T13854] ? tomoyo_encode2+0x273/0x5a0 [ 585.724035][T13854] __should_failslab+0x11a/0x160 [ 585.728983][T13854] ? tomoyo_encode2+0x273/0x5a0 [ 585.733832][T13854] should_failslab+0x9/0x20 [ 585.738335][T13854] __kmalloc+0x7a/0x340 [ 585.742496][T13854] tomoyo_encode2+0x273/0x5a0 [ 585.747304][T13854] tomoyo_realpath_from_path+0x769/0x7c0 [ 585.753030][T13854] tomoyo_check_open_permission+0x1f2/0x9e0 [ 585.759003][T13854] ? finish_lock_switch+0x31/0x40 [ 585.764025][T13854] ? tomoyo_check_path_number_acl+0x240/0x240 [ 585.770081][T13854] ? __schedule+0x677/0x9f0 [ 585.774614][T13854] tomoyo_file_open+0x141/0x190 [ 585.779459][T13854] security_file_open+0x65/0x2f0 [ 585.784389][T13854] do_dentry_open+0x397/0x1060 [ 585.789144][T13854] ? do_raw_spin_unlock+0x49/0x260 [ 585.794251][T13854] ? finish_open+0xe0/0xe0 [ 585.798658][T13854] ? vfs_open+0x2f/0x80 [ 585.802811][T13854] vfs_open+0x73/0x80 [ 585.806878][T13854] path_openat+0x136d/0x4400 [ 585.811493][T13854] ? trace_lock_acquire+0x1d0/0x1d0 [ 585.816706][T13854] ? do_filp_open+0x430/0x430 [ 585.821374][T13854] ? __kasan_kmalloc+0x178/0x1b0 [ 585.826303][T13854] ? __kasan_kmalloc+0x11c/0x1b0 [ 585.831228][T13854] ? kasan_slab_alloc+0xf/0x20 [ 585.835980][T13854] ? kmem_cache_alloc+0x1f5/0x2e0 [ 585.840993][T13854] ? getname_flags+0xba/0x640 [ 585.845660][T13854] ? getname+0x19/0x20 [ 585.849718][T13854] ? do_sys_open+0x2fc/0x620 [ 585.854297][T13854] ? __x64_sys_openat+0xa2/0xb0 [ 585.859135][T13854] ? do_syscall_64+0xfe/0x140 [ 585.863802][T13854] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.869919][T13854] do_filp_open+0x1f7/0x430 [ 585.874423][T13854] ? vfs_tmpfile+0x230/0x230 [ 585.879012][T13854] ? do_raw_spin_unlock+0x49/0x260 [ 585.884117][T13854] ? _raw_spin_unlock+0x2c/0x50 [ 585.888957][T13854] ? __alloc_fd+0x58f/0x630 [ 585.893463][T13854] ? get_unused_fd_flags+0x97/0xb0 [ 585.898581][T13854] do_sys_open+0x343/0x620 [ 585.903009][T13854] ? file_open_root+0x440/0x440 [ 585.907852][T13854] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 585.913918][T13854] ? prepare_exit_to_usermode+0x1f7/0x580 [ 585.919629][T13854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 585.925196][T13854] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 585.930914][T13854] __x64_sys_openat+0xa2/0xb0 [ 585.935587][T13854] do_syscall_64+0xfe/0x140 [ 585.940085][T13854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.945967][T13854] RIP: 0033:0x459819 [ 585.949855][T13854] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 585.969628][T13854] RSP: 002b:00007f2fdfd44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 585.978032][T13854] RAX: ffffffffffffffda RBX: 00007f2fdfd44c90 RCX: 0000000000459819 23:11:47 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 585.986014][T13854] RDX: 0000000000000002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 585.994007][T13854] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 586.001972][T13854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2fdfd456d4 [ 586.009934][T13854] R13: 00000000004c6007 R14: 00000000004dab90 R15: 0000000000000004 23:11:47 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 586.230022][T13854] ERROR: Out of memory at tomoyo_realpath_from_path. [ 587.624783][ T8073] device hsr_slave_0 left promiscuous mode [ 587.694276][ T8073] device hsr_slave_1 left promiscuous mode [ 587.774977][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 587.787330][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 587.799079][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 587.850247][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 587.936194][ T8073] bond0 (unregistering): Released all slaves [ 588.098234][T13888] IPVS: ftp: loaded support on port[0] = 21 [ 588.171698][T13888] chnl_net:caif_netlink_parms(): no params data found [ 588.200179][T13888] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.207488][T13888] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.215588][T13888] device bridge_slave_0 entered promiscuous mode [ 588.223360][T13888] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.230574][T13888] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.238388][T13888] device bridge_slave_1 entered promiscuous mode [ 588.259537][T13888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 588.270815][T13888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 588.290148][T13888] team0: Port device team_slave_0 added [ 588.371948][T13888] team0: Port device team_slave_1 added [ 588.428723][T13888] device hsr_slave_0 entered promiscuous mode [ 588.484536][T13888] device hsr_slave_1 entered promiscuous mode [ 588.544157][T13888] debugfs: Directory 'hsr0' with parent '/' already present! [ 588.570284][T13888] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.577505][T13888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.584888][T13888] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.591944][T13888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.661085][T13888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 588.681390][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 588.698547][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.712335][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.729492][T13888] 8021q: adding VLAN 0 to HW filter on device team0 [ 588.749447][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.765567][ T8050] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.772637][ T8050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.794836][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.803554][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.810721][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.834859][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 588.843470][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 588.852576][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.869982][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.882505][T13888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 588.902388][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 588.912967][T13888] 8021q: adding VLAN 0 to HW filter on device batadv0 23:11:50 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r4, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r5}, &(0x7f0000000780)=0x8) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000007c0)) 23:11:50 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:50 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:50 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4004010}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)={0x328, r1, 0x10a, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x7}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'hsr0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x9396}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}]}, @TIPC_NLA_MEDIA={0x138, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x41c83eff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd9}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x53ce3f2d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x41}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x328}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:50 executing program 0 (fault-call:6 fault-nth:7): mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:50 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:50 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r4, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000740)={r5}, &(0x7f0000000780)=0x8) 23:11:50 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:50 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='\\proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:51 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r4, 0x1, 0x6, @dev={[], 0x16}}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x2, 0x1, 0x4, 0x1f}, &(0x7f0000000700)=0x14) 23:11:51 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = getpgid(0x0) getpgrp(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x48000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) accept$unix(r1, 0x0, &(0x7f0000000080)) 23:11:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:51 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000680)={r4, 0x1, 0x6, @dev={[], 0x16}}, 0x10) 23:11:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/.roc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='//roc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:51 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast1, @in6=@local}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) 23:11:51 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:11:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/\\roc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:52 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:52 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) 23:11:52 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:52 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/p\\oc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:52 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:52 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000080) 23:11:52 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 591.672541][T14012] IPVS: ftp: loaded support on port[0] = 21 [ 591.848359][T14012] chnl_net:caif_netlink_parms(): no params data found [ 591.993959][T14012] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.001268][T14012] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.008964][T14012] device bridge_slave_0 entered promiscuous mode [ 592.136257][T14012] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.143418][T14012] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.155046][T14012] device bridge_slave_1 entered promiscuous mode [ 592.172919][T14012] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 592.306793][T14012] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 592.323569][T14012] team0: Port device team_slave_0 added [ 592.330911][T14012] team0: Port device team_slave_1 added [ 592.386978][T14012] device hsr_slave_0 entered promiscuous mode [ 592.444627][T14012] device hsr_slave_1 entered promiscuous mode [ 592.485002][T14012] debugfs: Directory 'hsr0' with parent '/' already present! [ 592.493908][ T8073] device bridge_slave_1 left promiscuous mode [ 592.500210][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.555502][ T8073] device bridge_slave_0 left promiscuous mode [ 592.561714][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.605564][ T8073] device bridge_slave_1 left promiscuous mode [ 592.612089][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.675120][ T8073] device bridge_slave_0 left promiscuous mode [ 592.681323][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.995603][ T8073] device hsr_slave_0 left promiscuous mode [ 596.044340][ T8073] device hsr_slave_1 left promiscuous mode [ 596.123485][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 596.137015][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 596.147897][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 596.190406][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 596.263079][ T8073] bond0 (unregistering): Released all slaves [ 596.435044][ T8073] device hsr_slave_0 left promiscuous mode [ 596.474469][ T8073] device hsr_slave_1 left promiscuous mode [ 596.531326][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 596.545820][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 596.558064][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 596.600603][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 596.699839][ T8073] bond0 (unregistering): Released all slaves [ 596.841689][T14012] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.849133][T14012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.856517][T14012] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.863695][T14012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.872530][ T9261] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.880300][ T9261] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.920179][T14012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 596.932644][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 596.941275][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 596.960342][T14012] 8021q: adding VLAN 0 to HW filter on device team0 [ 596.970404][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 596.979741][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 596.988845][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.995989][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.017029][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 597.025868][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 597.034727][ T9261] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.041808][ T9261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 597.049863][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 597.058963][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 597.120258][T14012] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 597.131038][T14012] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 597.143129][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 597.151905][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 597.160856][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 597.170535][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 597.179438][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 597.188282][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 597.196963][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 597.205419][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 597.265306][T14012] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 597.272494][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 597.288754][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:11:59 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x100, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000240)="8f6868ef8bde0000001ec7442400c3000000c744240200000000ff2c2466b88a008ee00f01cbb9320a00000f32440f38c89a5a5e0000c443755e038c467b9f3e0f01cac422399ed8", 0x48}], 0x1, 0x8, &(0x7f00000002c0)=[@cr4={0x1, 0x40000}, @dstype0={0x6, 0x1}], 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x1, 0x80000) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) chdir(&(0x7f0000000040)='./file0\x00') 23:11:59 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:59 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:59 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/pr\\c/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:59 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') 23:11:59 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:59 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:11:59 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000300)={0x6, 0x0, 0x19, "3a0db84c2ff3348889b30e3f9206c55cebeb7b69b618a7e257c9cfcba98b0854426c2350fc61a7c653dcffa9f0d5e1aeba22a49d2a504d17dfa4527b", 0x1f, "b632556bbb765cce957b3caf6af45fd24dbc7fd8ab67d3d4b754c1156220f3b2f50b18233e8261e1e3e3d9264e7e6a1199c9bf60acf7e10529f7cbc1", 0x80}) 23:11:59 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:11:59 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:11:59 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/pro\\/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:59 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getnetconf={0x14, 0x52, 0x210, 0x70bd2c, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x11}, 0x0) 23:12:00 executing program 1: mkdir(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0x10}}], [{@uid_eq={'uid', 0x3d, r0}}, {@smackfsdef={'smackfsdef', 0x3d, '%'}}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f00000003c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:00 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:00 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:00 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:00 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc\\sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:00 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000180)) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:00 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:00 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:00 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$NBD_DO_IT(r2, 0xab03) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:00 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:00 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/#ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:00 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:00 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xa9d, 0x103) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000006c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000680)={&(0x7f00000003c0)={0x288, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x63}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}]}, @TIPC_NLA_BEARER={0xec, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x27210643}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7d6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xca3, @loopback, 0x7ff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xf320, @remote, 0x80000000}}}}]}, @TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x148}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x37}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xca}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x95b0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x416b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x800}, 0x20040000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$P9_RATTACH(r2, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x4, 0x1, 0x5}}, 0x14) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000040)={0x3}) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:00 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:00 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:00 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:00 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/%ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:00 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:00 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:00 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:00 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0x640d, 0x5, 0x9, 0xfffffffffffff0a2}, 0x10) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:00 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:00 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/*ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:00 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 600.051757][T14132] IPVS: ftp: loaded support on port[0] = 21 [ 600.282887][T14132] chnl_net:caif_netlink_parms(): no params data found [ 600.305918][T14132] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.313055][T14132] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.322359][T14132] device bridge_slave_0 entered promiscuous mode [ 600.330589][T14132] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.337770][T14132] bridge0: port 2(bridge_slave_1) entered disabled state [ 600.345797][T14132] device bridge_slave_1 entered promiscuous mode [ 600.419743][T14132] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 600.430659][T14132] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 600.448391][T14132] team0: Port device team_slave_0 added [ 600.455393][T14132] team0: Port device team_slave_1 added [ 600.507245][T14132] device hsr_slave_0 entered promiscuous mode [ 600.574621][T14132] device hsr_slave_1 entered promiscuous mode [ 600.634266][T14132] debugfs: Directory 'hsr0' with parent '/' already present! [ 600.707759][T14132] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.715046][T14132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 600.722346][T14132] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.729453][T14132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 600.823124][T14132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 600.836687][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 600.845533][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.853311][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 600.863097][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 600.875892][T14132] 8021q: adding VLAN 0 to HW filter on device team0 [ 600.948343][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 600.956853][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.963929][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 600.985090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 600.993413][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 601.000543][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 601.008784][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 601.017566][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 601.026060][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 601.034790][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 601.110261][T14132] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 601.121928][T14132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 601.130810][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 601.211193][T14132] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:03 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:03 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000100)=@dbg={0x25, 0x40, 0x8}, 0x18) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:03 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/+ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:03 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:03 executing program 1: mkdir(0x0, 0x101) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x101000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='/proc/sys/net/ipv4/vs/amemthresh\x00', r0}, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000340)=0x4) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000240)={0xa, @vbi={0x4, 0x6c19, 0x8000, 0x43564548, [0xcc3a, 0x80000000], [0x10001, 0x5], 0x1}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000480)={@generic={0x3, "af725382ae4056df43a6e943b364ec23ea9f20f0a82a60bda16e75708b7d564719b8313f6a135fda1c6e1f40b12d5d85ae34d898e18c2684d972b8e8c04f838c393a870f27e33d3ba7996e617f0a7d67275cd7402f7899cec328f9bea399270794f62559c2ee4f919171f97f112ba4c72250335336b76a94b2ad923e4c4e"}, {&(0x7f0000000380)=""/134, 0x86}, &(0x7f0000000440), 0x4}, 0xa0) [ 601.395230][ T8073] device bridge_slave_1 left promiscuous mode [ 601.407660][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:12:03 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:03 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:03 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:03 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/-ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 601.504988][ T8073] device bridge_slave_0 left promiscuous mode [ 601.523369][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:12:03 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 603.384678][ T8073] device hsr_slave_0 left promiscuous mode [ 603.435122][ T8073] device hsr_slave_1 left promiscuous mode [ 603.493232][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 603.506224][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 603.516958][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 603.560180][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 603.622158][ T8073] bond0 (unregistering): Released all slaves 23:12:05 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x401, 0x4040) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x5, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:05 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:05 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x22400, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:05 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:05 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/.ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:05 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:05 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:05 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:05 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) 23:12:05 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc//ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:05 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:05 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x6) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:05 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:06 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/0ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:06 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:06 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:06 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:06 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:06 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 605.485521][T14240] IPVS: ftp: loaded support on port[0] = 21 [ 605.563005][T14240] chnl_net:caif_netlink_parms(): no params data found [ 605.605865][T14240] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.613078][T14240] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.621323][T14240] device bridge_slave_0 entered promiscuous mode [ 605.629404][T14240] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.636776][T14240] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.644808][T14240] device bridge_slave_1 entered promiscuous mode [ 605.662041][T14240] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 605.672916][T14240] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 605.689769][T14240] team0: Port device team_slave_0 added [ 605.696931][T14240] team0: Port device team_slave_1 added [ 605.766926][T14240] device hsr_slave_0 entered promiscuous mode [ 605.824767][T14240] device hsr_slave_1 entered promiscuous mode [ 605.864487][T14240] debugfs: Directory 'hsr0' with parent '/' already present! [ 605.993367][T14240] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.000618][T14240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.008034][T14240] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.015261][T14240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.107969][T14240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 606.119648][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 606.128461][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.136351][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.145115][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 606.158101][T14240] 8021q: adding VLAN 0 to HW filter on device team0 [ 606.236480][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 606.245070][ T9261] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.252130][ T9261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.260147][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 606.268583][ T9261] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.275691][ T9261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.283599][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 606.292616][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 606.374792][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 606.383392][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 606.392463][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 606.403043][T14240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 606.482861][T14240] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:08 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r0, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_NMI(r1, 0xae9a) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040)=0x7, 0x4) 23:12:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/Lys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:08 executing program 5: fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:08 executing program 5: fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/Xys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:08 executing program 5: fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:09 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:09 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:09 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:09 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/\\ys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:09 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x2000, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:09 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x40) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7fe, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000240)={0xc5, 0x29, 0x2, {0x5, [{{0x88, 0x0, 0x1}, 0x2, 0x3b, 0x7, './file0'}, {{0x0, 0x2, 0x8}, 0x20, 0x3, 0x7, './file0'}, {{0x80, 0x2, 0x5}, 0x1, 0x2, 0x7, './file0'}, {{0x20, 0x0, 0x8}, 0x2, 0x0, 0x7, './file0'}, {{0x1, 0x3}, 0x6, 0x9, 0x7, './file0'}, {{0x2, 0x1, 0x2}, 0x100, 0x3, 0x7, './file0'}]}}, 0xc5) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000080)={@rand_addr, 0x0}, &(0x7f0000000180)=0x14) getsockname$packet(r0, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000900)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000073c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f0000007380)={&(0x7f0000007400)=ANY=[@ANYBLOB="086a00003000080225bd700005000000000000005400010050001d0000000c000100766c616e000000000c000200080003007c09000030000600e393c77693fa8a1530fc47d2899f1db130dba7e5192174ca56fa1caf634fcf33e53a907d3abea2fc3d3cceaf0000944801009048030000000c0001007065646974000000f4470200500e040005000000000200000400000000000000080000000605000000010000030000003030000007000000010000000500000000000000000000000000000aff00000079000000030000000200000006000000030000003d0a0000020000000180000004000000000000000600000001000000060000000800000004000000070000000200000062b80000800000000900000000000000300a0000000000000100000041590000080000003440000007000000080000008300000009000000010000000100000080ffffffb1060000b8ffffff0300000001000000ff0700001f000000f004000009000000030000000200000008000000dddc0000a329000001000000000200000104000007000000ff7f00000900000005000000070000000180000005000000ad000000010000000000000007000000001000000500000009000000000000000200000001000000030000000200000009000000000000000100000003000000ffff00003a840000ff0300b7817c8e00000000000700000006000000000000000400000080000000b2000000ebd900002000100001800000040000008700000008000000320000000300000008000000ff03000008000000060000009e0e0000080000000300000080000000f7ffffff060000000000000003000000040000000700000001000000faffffffff0300000100000009000000060000002000000002000000030000000900000087f8ffff050000004d07000001000000bc2900000080ffff020000000700000001040000d3000000030000002e0e00000080000001040000ff0000008100000000000000010400000400000001000000060000000100010008000000040000004df300000300000002000000ffff0000090000000600000001010000ff03000009000000fdffffff00020000020000000900000079de0000690000006c530000080000000100000005000000ffffffff010000000100010007000000ff000000070000000002000003000000020000000100000003000000eee5729f4000000001040000ffff000004000000090000000100000009000000090000000400000006000000feffffff0000000009000000000000000600000005000000ff7f0000070000007d010000b60d0000a80800000000008004000000050000000101000020000000000400000900000000000080ffff0000040000000000008001800000412a00000400000003000000010000002f0b0000e400000000000000070000001f00000004000000ff0f0000200000000008000006000000060000005900000004000000ff01000040000000ff030000080000000100010007000000090000000104000008000000ff030000ff070000070000000010000003000000ff0300000500000005000000020000000000000006000000090000003f0000000200000001800000ffffff7f0700000007000000180000000100000003000000090000004e0d00000500000006000000010000009f0000000900000008000000d80000000700000006000000ff070000080000000010000000000080ff07000000000080000000001daa0000000000000100000000040000ff0f00000200000006000000ca6f0000ff0700000000000005000000080000000080000008000000ff0000000001000000100000040000007f00000000000000ffffffff01000000090000003b08000003000000080000000000000005000000030000000000000007000000010000000300000007000000f7ffffff0000000006000000030000000400000000000000000000000000000004000000090000000100000000100000090000000100000004000000070000000700000005000000ff0300003f000000ff030000ff00000065bd0000070000001c00000001000000725b00000700000040000000c5d500000000008000000000ff7f0000e70000000400000001000000ff0000000400000005000000080000000100000005000000020000000001000032000000020000000200000008000000ff030000000001000abdffff0100000000010000000800003000000001000080010000000600000006000000010100000100008007000000000000803f00000001000100be0000000000000095cc00003f000000ffffffff00000000ff0000000100010009000000030000000200000001000080080000004c0000000100010001000000ff07000006000000ff0f00009e0000005a150000030000000600000002000000520000003f000000d500000004000000d70e00000100000006000000feffffff090000002000000006000000400000000000000001000000050000000700000007000000bf00000007000000090a00007f00000000000100bf4f9f4404000000010000800101000009000000018000000200000000c0000000080000060000000100000006000000a10300000100000001000000ff01000001000080ffff000002000000fdffffffff0300000000000000000000e00a000003000000da840000080000001607000001000000080000000000000003000000000000000200000003000000f3170000000200000500000000000000c20d00000800000007000000070000000500000000000000aeb9000007000000090000000800000095af000085420000010000000000000020000000000001000000000000000080030000000104000005000000f300000002000000ffffff7f88000000f9ffffff01000000030000000200000000000000090000003f000000c20e00000200000007000000b4020000000000000080ffff010000008000000039080000080000000800000000000000030000000600000009000000ff00000006000000ff0300007e0e00000000010007000000ff0f00000700000001000000040000000001000001010000030000000000060000f8ffff0d0e00000100000041780000ffffff7fff030000030000000900000001800000ff03000003000000010000000700000098020000e3ffffff070000003642000005000000300000000500000001000000070000000100000002000000ff0700000000000003000000020000000010000084bb000000000000010001001b170000faffffffb10a0000700900000300000004000000de00000037ae0000040000000200000001000080070000001b1d000004000000080000001f00000000000000c20e000000000000000000000300000067b8781101010000ff7f000009000000ff9800000300000038090000ae0600000300000001040000ea7fd728000000ae3f000000000000000700000000000000040000000300000005000000020000007b00000001000100010001000500000009000000000001001300000002000000ffffff7f00000000000001004000000001000000080000000900000001800000810000000500000001010000ffff00008e000000ff070000ff07000007000000080000000100000001000080a4000000090000000500000040000000b6000000070000000900000003000000020000000200000007000000020000003f0000000008000000000100ab14000003000000e82200000900000002000000020000004300000003000000000000000800000009000000010000000104000042040000000400000200000003000000910d00000400000000000100000100000900000000000000ff030000040000005f9a000007000000060000000200000003000000ff0f0000ff0f0000060000002d86000007000000e1ffffff000800001f0000001f00000002000000ff0100000180000000000100ff0000000800000005000000e039000041000000090000005505000001000000b8000000060000000300000001000000010400002f3e000022e300000100000007000000018000003f00000081060000080000000001000080000000b7000000090000000100000006000000080000000600000008000000020000000100000001010000810000006200000000000000810000000300000009000000ffff0000cc00000006000000000000000100000006000000021f4a4803000000040000000800000005000000010001000200000006000000000000000600000001000080090000000300000040000000ff0100000400000001000000ff0f0000020000000300000007000000008000000400000003000000020000000100000002000000030000007c0d00000100000005000000f9000000070000008000000001000000000000000100000001000000ffff000007000000030000000800000004000000a500000097030000ffffffff07000000040000003f00000003000000070000000500000006000000020001000100000003000100050000000300010007000100030001000000010000000100010001000300010000000100030000000700010007000000010000000200000002000100050001000700000000000100010001000100000004000100010000000100000003000100000001000300000007000100030001000500010007000000060001000500000000000100030001000300000007000000020001000000010007000000030001000400010004000100010001000500010003000100030001000000010001000100040000000000010004000100010000000000000003000000070001000100000000000100020001000300000003000100070000000100000005000100040001000300010002000100000001000100010000000100030001000700010003000100030000000700000003000100030001000000010000000100050000000000000003000000040001000200010005000000050001000200000004000000060001000100010003000000070001000300000000000000050000000000010004000100070001000000010007000100060001000000010005000000000001000000000003000000070001000100010002000100070001000000000003000100050001000500010000000100040000000000010005000100030000000600010005000100070001000000010005000100060001000300000000000000380e04000800000003000000060000006b000000030000000405000004000000010100000800000081000000040000000800000003000000f9ffffffffffffff070000004c0000000101000000000000070000000800000085080000a59effff0100000000040000060000000dc10000050000000100000000000000020000003f000000ffff0000000000007f000000ffffffff00000000ffff000040000000010000000600000007000000070000000000000003000000ff030000010400002314110ca775000081000000c10d00000900000005000000f8ffffff01fcffff850000000500000009000000d8950000200000000800000009000000050000000300000008000000010000000010000001000000ff03000040000000010000000900000096c8fb7500000100010000000100000000000000ff0100000700000005000000ffffffff080000000900000002000000090000000400000001ffffff09000000faffffffffffff7f020000002f0000005f4b000081000000050000000800000002000000e30f0000f9ffffff0200000005000000ff00000040000000000000800200000009000000576dc3240500000000f8ffff01000000f9ffffff0900000008000000ff07000000000000018000000004000000000000ff0000005f00000005000000ff0f0000010000800e0a00000800000007000000000009002000000008000000ffffffff0400000006000000060000008a120000070000000000000045e800000500000005000000a30000000900000001010000080000000800000003000000010100000400000005000000ff010000ff7f00008f6a1f460200000007000000ff000000010000000200000081000000f8fffffff900000006000000090000000100000005000000020000000100000008000000acf9ffffc70000000200000002000000ffffff7f0800000008000000070000003f0000000000008000080000050000000100010006000000040000005d0900005705000003000000000000008100000007000000fbffffff000000000000000000800000ff0f00000000000000000000050000007e04000009000000fa550000070000000900000003000000040000007779000000000000a0000000070000000900000001000000f8ffffff000000008100000005000000d50b0000020000000000000002000000c30c000003000000270400000300000007000000060000000500000006000000060000000200000000000000ff7f00000000000008000000840e000006000000200000000bfffffff90700000700000005000000200000000800000009000000010000008c0b00000500000001000000ff7f00000900000015520000ffffffff1000000004000000000000804000000002000000a1080000090000000100008006000000d893dd2f008000000500000000000100060000000600000000000000080000000100000000000000000000000400000001800000040000000500000000000000ff0f0000070000000000000004000000ff0300000300000004000000cd25ea290700000000000000149700000600000005000000800000000008000004000000010000000000000001040000d6a800000101000008000000979600000400000000000000050000000080000074000000f8ffffff06000000000200000400000095000000da000000040000000000010003000000050000000100000009000000ff000000eb000000000000803f00000008000000eeabda7cffff0000040000008000000001800000faffffff000000000000000079ca0000060000000001000002000000020000000008000004000000010000000000000001000000010000000500000000080000fcffffff00000000010000000000000007000000ff0f000042d00000c296000009000000070000000300000007000000060000000080000002000000040000004d0000000000000001000000ff7f000001000000010100000900000003000000ff7f00000000000000800000018000000700000008000000050000000000000008000000a904000001000000050000008100000003000000080000003f0000000600000000010000000000000700000003000000ffffff7fff01000007000000130a0000008000007f00000002000000010000000400000001000000ffffff7f06000000010001000000000006000000030000000800000005000000ffffffffb4faffff4c0000000300000002000000da000000010000000100008004000000ffffff7f008000000104000000fcffff01000000000001000500000008000000200000008e000000f7ffffff040000000100000000000000f7ffffff000000800300000008000000718700000600000006000000470c000007000000000800000900000000000100000000000400000050e70000ffffff7f050000007100000009000000ff0f00001f0000002b30061508000000a10000000700000000020000acdd00000000000051000000c0f7ffff80ffffff050000000101000001000000ff0700001800000000000d000600000008000000020000000600000000fcffff0700000006000000010000006e090000050000000600000001000000ffffffff03000000070000000600000009000000000000804609ffff0100000000000000008000008d1f00000600000000000080310b000008000000000800000300000030030000080000000700000043000000200000000400000003000000010400007f0000003f0000000400000008000000d5560000010000000400000004000000ff7f00000400000000000000820000003f00000006000000080000000700000002000000514d000007000000d200000007000000eae40000ef000000020000000008000003000000ff0000000800000004000000980000000100000006000000020000000004000018810000ffffffff001000000900000009000000010000000800000000000080010000800100000000100000080000000400000001000000080000000700000085050000030000000100010000e03f00080000000600000072000000090000000500000006000000040000000080000000000000080000000100000007000000ff010000ffff000080000000010000000200000040000000ff0f00000600000005000000010000001d00000006000000020000003f0000004000000001000080ea020000230c0000010000000080000003000000080000000200000081000000080000000400000088000000425300001f0000000900000007000000080000001b7800003f00000004000000060000000900000070b40000010000000000000003000000a2320000af0a000009000000800000000104000003000000040000000010000006000000b6020000f7ffffff05000000070000002d8f00000400000000800000d9000000000000000200000098000000030000000900000005000000ff7f000007000000050000000600000020000000080000009600000007000000ff000000190d00000800000009000000ff070000f8ffffff090000000000000000000000ffff00006c8d00000300000045ffffff030000008c0000001000000000f0ffff000000009e07000074bf000018000000cb0c0000010400003f00000003000000ffffffff00ffffff0500000001000000ff7f0000020000000600000007000000feffffff01800000040000000500000001000000ff0f0000080000000100000009000000d406000000000000060000000000000000080000ff7fffffe446000006000000080000008a000000050000008e070000070000009a000000020000004c00000009000000ffffff7f050000000600000060ee3e5c0400000004000000d80000000000000009000000000024001f000000feffffff0600000007000000090000007304000002000000000100000101000000100000010001002d02000003000000ed00000008000000000000006aa9000000020000d70000000500000001040000010400001f000000000000009507000080000000060000009908000007000000080000000500000008000000008000007f000000ffffff7f0100000006000000ff000000dc0000000800000006000000c1c90000060000000100ffffffff000000020000090000004b020000080000000000000000000000ff7f00000400000001040000dce1000042040000811e00000000000007000000018000000100000009000000990c0000d400000003000000ffffffff9700000000f8ffff00000000000000c0000000000080000002000000428e0000020001000400000001000000030001000700000000000100010000000000010007000100020000000700010007000100050000000500000002000100000001000000010000000100050000000300000003000100010001000100010001000000030001000700000005000100010001000500000002000000050000000300000002000000000001000000000003000000050001000000000003000000020000000700010004000000070001000200000003000100020000000400010005000000040001000500010004000000000000000400000003000100010001000000000000000000050000000000010002000000020001000700000007000000050000000400010007000000010001000700010000000000050001000700010004000100000000000400000003000000030000000500000004000000050001000500000000000100040000000400000002000100030001000100000002000100020001000300010003000100050001000500000006000000030000000300000005000100030001000400010005000000010000000500010005000000050001000300010003000100050000000000010004000100050000000100010000000100030001000300010000000100010001000100010005000100040001000500010000000000000000000000010000000000060001000700010002000100070001000700010001000000500e0200008000000700000000000000ff0700000500000000010000d20d00000100010008000000ff030000ff00000005000000ff0700000200000007000000040000000008000000000000ff000000ff0100000000000040000000060000000180000003000000010000000300000005000000040000000004000001f0ffff0400000001000000008000000600000005000000000000000700000006000000cb0500000100000001f0ffff00020000294dbd5b01000000990c00000900000002000000fb000000060000000000000007a40000ff01000001000000050000001f0000000008000056090000050000000300000001000000010400000400000004000000a916fffff7ffffff0100008020000000000200003f000000030000000d7d0000fdffffffff0f00000000000016040000000000007f000000200000003f0c000008000000080000000000000000000000010001007f000000ffff0000ffff000040000000090000000800000000080000feffffffdc0000003f000000f10000000000008000000100010000000b000000000100008800000005000000250000000d4d000081710000010000007f000000050000000300000009000000010400000900000007000000e0ffffff00ffffffff070000090000001f000000fcf1000009000000000000000000000080000000030000000600000009000000dd000000050000004000000003000000090000007f0300000500000090cc00000100000038adffff010000000700000001000000ff7f00000100008075000000130100000000000000000000000000000800000005000000ff0f00000000000001000100a500000006000000000000000101000009000000ff0100000900000000000000000000000600000004000000050000000008000009000000000000000080000001000000010400006f0d0000010100000613000000000000af00000009000000090000000500000005000000050000004919000004000000ff0300002000000009000000080000000600000009000000ff030000202b0000142a000008000000090000004300000007000000f900000007000000000000002a00000008000000010000000500000000000000800000006baf0000000400000000000017000000ffffffff03000000020000000700000009000000b2c7ffff02000000030000000100000008000000ffff0000000100001f0000000800000016100000ffff00000b07000001000000ff07000001800000ff00000006000000090000000200000001000000020000003f00000001000000ffffff7f810000000f000000b6a90000090000000080ffff04000000050000000000000003000000090000000700000001800000020000000300000064af0000000200007f0000000900000032650f190100000007000000040000002000000004000000f9000000340000008c050000400000000200000005000000502000000400000006000000ff7f000007000000ff000000070000008100000000010000b5030000f3098083020000007f000000090000000000000002000000000000007f0000000200000006000000000000780104000001f0ffff08d100000000000005000000ffffff7f0400000001000000090000000500000007000000040000000100000000000000a404000080000000040000003f0000000700000008000000000000002e0000002cb65a24a7000000040000003308000031750000160b0000884cffffe9ba4805ff00000005000000c601000007000000800000007f00000009000000ff070000ff7f00000300000027870000070000000008000086e400001f0000004b0400000100000000100000970e000040000000ade60000090000000000000004000000000001000600000000080000ff010000b800000051f7df700000000004000000fdffffff0400000000100000020000000200000006000000ffffff7f060000000400000008000000000000000400000001000000551f6e200000000000000000ff00000002000000020000000100000001000000fbffffff0600000007000000000001000100000069f600003e1300000300000007000000060000000002000001000000b5c6000000009c030101000002000000070000000400000000000000ffffffff0000000005000000154000000080000004000000020000000000010000010000018000001f00000006000000ffffff7f0800000000000000090000000100008000000100bbffffffa80400000000000000010000ff01000002000000070000000100000004000000ed01000003000000060000005f0400004e6400000900000007000000070000006a0000007f0000000100000000e07f00ffffff7f00800000010000009ac8af000900000009000000ffff000036e4000020b80000000000000500000081000000070000007fffffffff7f0000ffffff7f42ec0000070000000400000005000000510400009b000000390900000400000005000000faffffff00100000070000002c0100000000008000000400000000004b0700000000000008000000040000000400000001000000944a7c2708000000fffbffff0000000000000100deffffff04000000fb6500000800000000000000000000000000000003000000030000000100000003000000130d00009905000001000100050000000600000001000100900000000700000001010000ff03000000000000040000007f000000050000006a00000002000000030000000500000005000000000000000000008002000000c07dffff08000000f60f000006000000f7ffffff06000000b003000004000000000000001f0000000000000004000000ff07000007000000ffffffff030000004b0800007f000000ff0f0000030000000400000000000000800000000900000006000000090000007f0000000100000001000000010000000000000180000000ff070000040000002000000000800000000800000900000013000000010000000800000003000000070000000900000004000000f50e0000000000000500000001fcffff040000000800000051720000070000000000e8ae0500000001800000060000000400000000000080010000800000010001000080810000002317000000000000800000000700000006000000ff0f000039a7000004000000060000000100000008000000d7000000050000002b1e000007000000693a00000180000003000000030000008000000009000000fd0e000006090000080000000100000000000000060000000100000001ffffff627c0000fdffffffeb09000005000000d704000006000000008000007f000000760c0000040000003800000007000000010000803d0000000500000009000000af080000ff00000020000000050000000800000000010000e800000017010000ed0c00000800000003000000020000000000000004000000450000000100000008000000020000000300000000040000818d000007000000060000008bdea65dfdffffff0100008099000000040000000800000002000000070000000104000009000000000000808100000009000000ffffff7f05000000ff03000001000000200000007200000081e000001d000000010000000100008000000000050000000001000001800000d0fd000001f8ffff090000000600000005000000f600000009000000b9000000ff010000ff000000913e0000ffffffffff000000090000007b0e000000040000b78300008b870000060000000004000004000000f8ffffff77760000000000003f0000000010000004000000900000000000000003000000010000000100000001000100280e0000ff7f0000080000003f00000001000000ff07000009000000ff0f0000080000000600000002000000030000005e0d0000090000000900000004000000000000000800000009000000e20b00000000000001000000f000000002000000040c000001000000ffffffff08000000d7000000ff07000006000000fc4100008000000098300000229f00009b8e00000001000007000000070000000300000000000000561f000000000080ba81ffff00800000040000000d00000009000000ff0100000100000000800000f7ffffff00feffff010000006f0f000001000100070000000100ffff5d0b0000090000003f00000003000000080000000000000000000000080000007f00000000100000feffffff010001000400000006000000ff01000007000000ffffff7f0a03000004000000ffffff7f000100000600000009000000000000004000000002000000ff000000090000000400000002000000000000800000000000000100030000000400000005005a8a04000100040001000100a88d0700010000000100050001000700010005000000000001000300000003000100000001000100010004000000000001000200010005000000000000000400000001000100020001000300010004000100040001000200010002000000000000000000000007000100000000000700000003000000050000000500000005000100050001000700000005000000000001000400010002000100040001000200010005000100030001000100000002000000050001000300010002000000000001000700010003000000040000000500000001000100000001000000000004000100070001000400010007000100000000000000000000000100070000000200010003000000020001000700000002000000000001000500010004000100040000000300010005000000020001000300010004000100030000000500010005000000050001000000010002000100010001000400010004000000000001000400000003000000050000000500010000000000070001000700010003000100070001000700000007000000040000000000000000000100050001000500000007000000050000000200000000000100030001000100000005000000020000000300010003000100030000000500000000000000070001000400000001000100010001000500000000000000680e040005000000000000000800000001000000890d0000000600008e00000009000000010000801d91804b0600000081000000ffffffffff0100009000000006000000800000000080000001000080ff070000060000000800000000080000070000005500000002000000000100000200000009000000f9ffffff0400000000000000ffffff7f0100000005000000030000000a0b00000104000009000000ba0f000000000000fbffffffff00000006000000800000000900000005000000010000800600000000000000faffffff02000000ff000000050000000800000007000000010400000300000007000000030000000400000003000000040000001f00000000000000000040070000000006000000810000000800000000000080030000000500000004000000000000000800000006000000ff000000c90c0000000200001e0000000200000005000000020000009701000004000000010000000100000000010000010000000300000009000000ffffffff050000000700000001000000450000000700000000000080030000000100000001000080000000000600000004000000b9000000070000008100000004000000a207000001000000800000000180000007000000ff0f0000ffff0000010000007f000000ff0f00000500000005000000080000007f7d00000800000000f0ffff0500000005000000020000000800000001000000010400000600000000800000010100001608000004000000008000000500000004000000090000001c020000070000002b010000020000000700000027fffffffc07000000000000a20b0000633c00000500000000f0fffffdffffff00800000e90b000021449371070000000800000004000000050000000000000009000000080000000200000002000000ff000000ffffff7f1f000000090000000800000001000000ff010000020000001f00000047a8000006000000020000000400000015000000060000000080000000000100f8ffffff03000000810000006c0d000002000000ff00000004000000fcffffff090000006100000081040000ff3d000007000000cfea000000000000ffffff7f1b0000000104000005000000050000006f5b000001000000040000009f0000000800000000000000030000000300000007000000030000007f000000d4000000a800000002000000010000000100010000000000ea03000068460000ff0300000104000006000000a2000000020000000300000000000000a6ffffffc6154c1301800000010000000900000001000000ffffffff0000010008000000080000000200000009000000ff070000010000000600000063000000075fffff0500000040000000000400006ed7ffff5b00000006000000020000000000000001000000770700000001000000000000800f000002000000fe1d000022c60000b00d0000030000000500000003000000e3b90000010000004d4e00000700000000000000010100000500000004000000000200000400000005000000000000000000010000020000060000000400000001000100be2a000000000000010000009d0000000700000000fcffff4a1db55e0200000006000000070000008e000000040000000100000000040000080000000500000001040000ff7f00000600000007000000080000000700000001000080070000007d00000000020000018000000700000003000000a2000000000001000500000008000000a70f000040000000ffff000071b1000089000000ffffff7f810000000600000006000000090000003f00000002000000ff0000000000000006000000ff03000008000000010400000200000007000000090000000ea400000800000007000000020000000104000004000000a00000000200000000000000b8000000020000000900000005000000ffff0000faffffff0cd40000090000000700000081000000040000000000000001010000050000000200000009000000ff01000016000000070000000180000008000000080000000800000009000000090000000900000002000000ff0f0000050000000800000008000000ff01000046ffffff0000000006000000040000000000000000180000010000008f0000007f00000073000000090000004000000079030000040000007c00000000000000710000000000000057c90000abef0000030000000180000003000000ffff00000200000005000000320000000100000004000000a3c40000b9e30000290900000800000009000000e2050000030000000400000009000000800000000500000001000000ff0700000100000000000000000000000700000002000000810000003308000000000000fcffffff060000000600000020000000070000001f00000000000000070000000600000000000000448c00000000010007000000ff030000090000000000000003000000520000000100000000000000ff010000bed00000040000000100000000800000f25f00000300000008000000b4d700000200000000000000c6000000000400000200000000000000050000000600000000000000000400000080000000100000010001000100000000000100ff00000006000000000000000900000009000000060000005d34000005000000010000003f000000ff7f0000a00c0000ffffff7f0900000001000000c393000000040000010000007e1db3540400000000000000ff0300000200000000000000060000000104000020000000ffff0000ff010000020000000400000081010000ff0100000200000009000000000000000600000001000000ff7f0000ff0300000100000058b70000070000000800000000000000090000000800000009000000000400000100000054000000d50b00003f000000000000002f01000081000000080000000000000004000000030000000500000008000000e800000003000000050000000700000000000000de00000000000100a9060000ff00000023feca69040000000080000069000000080000000500000003000000050000000200000005000000010000000700000000000080000000800400000001010000ff0000000100000002000000f808000008000000000000400500000000000000ff000000040000000100000006000000070000000100000008000000ff7f00006a910000090000000000010006000000f8ffffff2909000005000000ff01000000010000fe69000002000000090000000180000005000000090000000600000007000000030000000300000000000000300500000800000006000000ffffff7f00000000000800007f000000fdffffff1a31000007000000ff7f0000020000000100000005000000ab240000010000000300000002000000ffffffff005e00009b0d000000000080080000008100000000040000090000007d000000080000000800000001000000be2f000007000000ff0f0000060000000100000004000000ff070000080000007f00000003000000000800000600000009000000040000003f0000000000000005000000070000000300000006000000ff0300000100000009000000020000000000008041000000ffffff7fff030000ef35000003000000ff0f00000101000051ef000002000000030000000600000006000000070000008100000088e20000020000002d0a00007f0000001f00000001000000ffffffff00000000090000000300000000feffff0700000000000000f63d000001010000060000003f000000320000000400000000040000d4000000331b000003000000000200000700000040b00b57050000000000000008000000ff010000050000001f0000002000000000ffffff01000000020000000004000007000000ff7f00000200000002000000e9000000060000000100000002000000000000000800000004000000000800000004000008000000f2bcffffffff0000018000000500000008000000000000000800000002000000e8420000000000000300000006000000ffffffff070000000600000000000000ff7f0000504b332b01000000f6d70000050000000100008001feffff08000000070000000000010004000000060000000800000006000000ff070000f9ffffff09000000000000000000000005000000ff00000006000000ff7f0000f7ffffff02000000000100000100000040000000d70000000600000003000000040000004000000001feffff09000000000200000600000000100000010000000100010020000000000000000000008000000100ff0300000100000002000000fc03000000000000c2000000ff7f000002000000a40000003ff20000610700000000000002000000030000000400000001800000ff7f00000100000005000100000001000000000000000100030001000300000007000000050001000500000094cf01000400010005000100030001000000000004000000020001000000010007000100040001000000010007000000000001000300000007000000030001000500cd690100000005000100050001000100010000000000020001000300010001000000050001000700000003000100050001000200000000000100020000000200000007000000020000000000010000000000000001000700010004009ced0000010007000000020001000100010005000000000001003b860000000000000000010001000100010000000500010002000000030000000300000003000000040001000500010004000000070001000700000006000100030000000500000000000100050001000400000004000000000001000000010000000100030000000500010005000100030001000000010007000000010001000000c31d0300000003000000010001000300000003000100020000000100000003000100040001000700000005000100010001000200010004000000010001000700010007000000040000000400010000000100050001000000010007000100040001000500010003000000070000000200010002000000010001000500010005000000030000000400010084dc0100070000000000010005000000050001000300000001000000b00e04000503000007000000ffffffff880000000700000000ad00001ef8000000000000f7ffffff010000000000008007000000f8ffffffff010000ff0f000001000000010000000101000000100000fc00000000000000ff01000003000000000000000000000008000000040000008c0d0000ffffffff51ed00000002000000000000080000000400000080000000040000000700000001000100080000000100000000040000ae01000009000000fc02000004000000060000000000000002000000000001000000010001000000ff0f000008779014feffffff07000000ff0f0000070000000002000009000000bb020000fe0a000001000000050000000800000003000000080000003c6700000900000002000000e1ffffff010000000600000000010000f40d00000000000007000000030000000500000000000080090000000200000000000000000200000010000001000080010000000000000000080000000200001e04000000800000ffffff7f0700000080bb03000700000007000000050000000700000000040000000000000400000001040000ff030000050000000400000000000000ff01000009000000bb010000ff0100000300000006000000400000000600000001000080040000000010000093000000200000001e070000ffff000007000000792100004088c90bfaffffff7d96000001000000a9000000200000003f00000006000000d1250000050000004000000040000000010000000400000009000000ef040000ffffffff0100000020000000000000000100000008000000050000000000000000000080ff030000c6000000ff0000000100000001000000ffff000006000000ffffffffffff000004000000000000000200000000100000000000000500000002000000ff7f0000320000003f090000ffffff7f090000003a00000005000000000000003c0f0000000100000000000002000000ff030000030000003f000000050000001f000000010000000010000002000000090000000900000007000000ff0000006c030000000000000080000005000000fffffffff54c000000000000080000006a0a0000080000000000000006000000000000000500000006000000ff0f000007000000050000000500000007000000040000000002000007000000b3000000b22be60703000000f9ffffff010000802b0300000800000005000000060000000000000000000000040000002b0e00001f0000000010000003000000090000000080ffff02000000feffffff00020000d4da0000e4f80000da050000ff7f00000100000006000000f2a000000900000051da00008e6b0c6900000000ff000000ac374e6400000080cc00000007000000080000008100000001000000000000000100000050fffffffffffffffeffffff0900000000000000ad2c0000060000000000000007000000020000000400000000010000ea000000ff7f000000800000b824ffff008000000600000007000000ff0f000008000000000000800400000001000000000000000002000001000000030000003f000000ff7f000009000000001000002a0000000000000008000000060000000800000001000000000000008000000081000000ffff000007000000000000000200000000000000060000007f00000007000000ff0100000000000009000000080000000800000001000080080000004a0c0000ff010000060000001f0000000000000005000000010000003f0000000200000001000000000000007e9743e10080ffff000000000300000001000000f30f0000ea060000ff0e000003000000953d000009000000010000000000000081000000e2faffff040000003f0000000600000023e5000004000000001000000200000009000000040000000004000009000000140000000000000080000000070000001f000000ffff0000090000002000000000040000000100000700000003000000cf2ae3740400000000000000a9d500007f000000008000000104000009500000ff0700000900000002000000050000000600000004000000b1000000490300000600000007000000cc000000ffffffff080000000300000001000000c0ffffff0004000003000000f7ffffff81000000010000000500000001000000000000004000000007000000010000000800000003000000ff0100000100000080020000800000004200000002000000de000000ff00000000080000030000001130005900000080ffffffff020000000800000000e00500060000000100000007000000ff7f0000040000001a0000005f000000080000000000000000000000090000000200000003000000b30000003f000000f9ffffff0600000001000000008000000300000000000000fc9b05760000010000000000fdffffff01000000070000000100000003000000020000002ac70120030000000000000006000000090000000100000004000000040000000000000006000000060000000500000007000000ff7f0000faffffff0400000035000000000000000000000001000000ffffffff3f00000000000000020000000200000006000000ffffffff08000000bb4c0000cf910000f9ffffff06000000018000001f00000001010000000000000800000057000000060000000900000006000000000000000100000002000000070500000900000000000000000000000000000009000000200000000100008001040000010000000800000001000000020000000000000002000000ffff0000ff070000080000000500000000000000070000000600000003000000070000000800000004000000b90a0000f7060000ee000000ffff0000ff01000007000000f8f6ffffff0000000500000002000000b4000000ff7f000004000000070000001c00000008000000000000003f000000070000003f00000000100000ffffffff0500000003000000c9a100000300000000000000070000002d00000006000000010000008200000000010000ff07000005000000050000008000000009000000050000000900000000020000010000000200000001000000000000000600000009000000f7ffffff06000000070000000100ffff090000000400000008000000ee6500000000000005000000010001000100000000100000e60d00006300000008000000000100004000000001000000be0c0000c2000000ffff00000900000003000000000000000900000004000000ffffff7f07000000000000000800000007000000ff010000c1d50000ff0f00000104000002000000ff0f000000000100070000001f00000004000000ffffff7f060000000600000000000080010000000000000009000000030000000002000080000000080000000000000007000000fa04000009000000018000000e00000000000000ffffff7f0200000000000000f7ffffff03000000040000007f000000ff0f0000010000000400000005000000920c000000040000ffff0000b40000000500000000000100236900000000000001000000070000000180000000000000090000000600000000080000000001004000000000000080060000000000000006000000090000000700000000000000090000008100000009000000ff01000020000000ff010000f48b000000000000020000000004000000fe1f00020000000800000000000000ff0100004000000001000000bb580000060000000000000000000000daef00000500000006000000010000000600000044000000f1000000200000000500000040000000830c00000200000009000000000000000900000006000000070000008100000002000000340d000008000000080000001400000001000000ffffff7f02000000ae0c00000100000001000000f60f000002000000010000000100000000020000e6c600000600000002000000ff0f00000600000004000000f50c0000ae37000009000000000000000700000000000000010000003f00000006000000ffffffff7ccd0000010000000800000001000000010000005a0c00000500000000100000010000800000000000000000f1000000ac00000002000000ffffff7f01000000ff010000000000000000000005000000a7a90000040000000100010001800000010000007f000000ff7f0000050000000000000001040000c50000000400000081000000200000001f000000ff0000009f09000000080000850f000002000000ffffff7f78cc0000ff0f0000050000008100000002000000010000000000000002000000ffff000003000000fdffffff05000000fbffffff010000000400000001000000030000000800000000000000fdffffff070000000001000000000000fdffffff0700000005000000a3b60000060000000000000007000000fffbffff02000000487c00000800000009000000130a920a01010000fcffffff01000000060000000008000007000000040000000300000000800000000001000100010003000000030000000300010007000100000001000200010000000100000000000000010000000000020001000200010004000000050000000700010000000100030001000400000000000100040000000200010004000100020001000400010002000000000000000500010002000100030001000400010003000000070001000400010005000000040000000000010000000100000000000500010000000100030001000500000004000100000001000400000000000000030001000200000002000100000001000100010007000100050001000000010003000100050000000000000000000100050001000300010005000000030001000100000007000000030001000500000000000000030001000500010002000100000000000100010004000100030000000300a6c906000100000001000700010007000100040000000200010000000100010000000200010003000100070000000700010005000000000001000500010004000100040000000200010000000100010001000500000000000100050001000100000003000100030000000700010003000100040001000100010003000000000001000700010003000000070001000500010003000100070000000400000007000100020000000300000007000100010000000300010005000100010001000400000003000100040000000400000001000000880006000055e61acb1d55720bdf3fefeb62fe7778e085aeb760e6d331405c71328f98bf134a336d6b04759e21384347d20263921be2265e85ad987fa6039c2d4bf46072a6a601cc4a7eddc40a0efaf9d4e8b4430018428e6f518dfc733961707fc7e4a10366f69fa452f173e0bd57bebcd12d9b99377f9886c4f90dff6a58cd0b78cb10980000000000801001007c101a0000000c00010073616d706c6500006400020018000200020000000900000008000000ff0f000000020000180002000001000000000000010000003f00000001000100180002003f0000000000000006000000f39600000200000008000400080000000800030006000000080005000513ffff04100600cb8c38577e831fd7ff3b7c49545fbcf4ed64bee85825d616276e404a6a52e7b3b3029e89e78d1af8975cabf199b9e7cb00eb06962dbe0e2133655970151f2657e2fb7ca1db00f209b7d7e8d11cae9d0110e8aa00d96cbdcdea34a4842a981a4a46f34c7c56b4963466830bbfc1ad0ea459f498ff7a79714903af01a58228778621d42f5da1590010d8f09a43603418bbb16b2e4e96d3b6205a7dd531c258c8d391035326b8130ecbbb4fa0791b33ad707388b1640ca5c8f2ac247ed258286ffe961d51048b2275ee4f24555a79169ed790836b320bd5ee32f364282cca7ba7e912f583fe8a03dbf8bb5d630ec131fa8b48db9358b1b758ef423ff22b9f26d29843550a636a3ca10c100f192b457e34ce1e442947303481283f6c614b7def99083ce6f0b5b289e5672194975121f876fd0f7ae83aa57fdc132a849c01740f2d7429e495c9ae79f32d19bf2baf88b0c4e3e3e84d4dcda79b4fc201ca97540b35b70d07ce8f3603a32151b7855c052aee01651110a2ee6293d52352e50a36398e945211547ed2abb9cebb353f9a659572abf48dd9a5fbc2924358aaf3fdd57b163e1a3618c7ce3dd7534da57136a468ffc99fdc8131eac32108c5903754bd1c4beffee3d93e6180de2a632ceb63735c8f669d3b6f42776cdfcdac0cf582f5134d1e70164864400b3f47fffedcf33d6396e334acdf651b7e5ce077eb86c0034ec1b4708a0ab655ceb54c5eaea09de475b12ab697e001e7595cfbcdaeb2a7cad9c4dbbf722c55d13612e0ca8ec8f9142add342e9c044dc1b234d2d57d3e9ca60ff0e28da16fe5937c465f95592d3404a19c5c49633001c750767007ef217d5774068f6f1c40ccd0ec7f9a8b3f4a1ef71100231ccbef27b50d1aca909101f0aeeddea203039bf82f085b2b32cf447fc31d058e7f59a8823de0cdec3315a555ba8bec55a6702eb4a5eecc491b407c0fac737d2727c436f1348b0ac187f22a9bcebeb345bdeb58d8e681f7888cd14ff802cbc1a5e497e253b7d2cae2d965d16d8bebe2b13acd98119c777db8bd465055b70dcffe899e65de37f62c99c4d5309f4b053628e788d29878294a182f1765a1f3b1bf353d21ef175c1dc06271dd81f9c654734848079b6c235d47ac1f22082bbd69b1545f2aa5382ac0690544f2bb9375bc14ef2ab19a8f519cabef2f388bffcea09b39bd21f9209deb6c899e8884cc5bd739e0b153c79a3d695c8780201b66fb8c4324d3996370005215be07ec8bc80e90193c090d80a2b09a753b5f27e323e825eaed1cec3d40780c1c85afcfd0b98ef0922e72152256fb310ee7ac5fc42e057e6fcf3ef4bdfc5b413d8f4be6d7d01be22b8a2ef5546df5d7ac5b790d4e2fc5bcc01856ce8d473b79571bda72db8531905f13b73916b4ff71a0851719003703fe96d63e137294d42ebbd562b04426d1cd4ce935a165331b0e49793f350bd4084acfd60469babd5b993210a8666c22be3fa0be18166050983b47238e5d40f45555ba1083b84913d8032af4b915a5fd3e0a87216ba78fe6436a07690421e5f8f70ba0499c0916b50ead7c22dbb5f88f4e8f550bc3c8d84eee5338cb383f2569410d02f0789255aef49a642a3532c7e640bf67029700ee35a71232e04dd0e5a0f3ebc548d90d5a4155e46d4ab99dc48933d907788f8bd2d1bdbe6bb2dfdc04d55a2b4cdb92a216eaa771a115d7cedc1ca30b0edeeb7ec08ee8dbdbc9cf9605cee11b0547551e1d097b0fa23dec7afdfd1da45ec41cf1c6bd5096a58aea1ff19ea3371edf6d5fbb5495cd5ed49abd6ebac3ef533d466cc81882a178d616dfc0f1994ef573ad6b9399be26d0d16c69d1da93bb908dc25d42a03f5321bee1f75e6fed7fe58555fa6a1823621d218960cbcbe03706f5dd1ccae68a55bbe73b096a5d0b0d0911bfd085c7dc6f04cc3f35c031fe2e3388d16ea18edf59c6ac3a4057ec400dc4922db3e0346cafb5aaa8b938ecbdb5564bf713ff790b3c47834c3d5e854ff114c72d3d3819f5101877d208635b5c07dbeff9739dacde00d39d83449d922ace12c59988ac6fbd29470a3a63a960ad940cfe2f593d545303f92136f235d8a9e630e2774fefc0e0fe99e3b55a5e135ffb580f55d5c0cda4f04b0164cf9ee52207927bb059313ec96d1c5459bbd87f8f356691f48fb6b685a3b50a345feb733832bf913104682459bf31c3bdeeafdbd4c4d9236901d989716b814adeba99979753d4e75b50a47d1a966ffc30bd7d90004d939cbe6caf6a8ac4e8343b8997cec9760e440850b09e15462b1e98802f3c2b57f73eb22503a1d626e943014b09c87ccd0438f18b2cfd2811696e12a762162ce1cbdda98e03786fb4d34307e9ae8d4177c6d9034127d77c36300198f23b9c8fd7137f6ebd237b83fd7a1d99b8005a66fd5077f81029ab595a22ae527bd4eb217fdad68d72d69bc2f5f5804960ccea6daf848491840832efb72d2e54fed9759711e9c7e2668496d313dee6b39bfa52fe2443311db01715b2113a049f2859d1bf2a7f2107822beffc351ffb305d9032abdb11f8330b795d2826b98cd9107c8f7f4610ab0ff29351ff3589005ac2bd91f7da0c2e41860b549813a86ec5dcb7b63bf617f0d821c0ed7b0df513bf20591b225b20c81e2c00fc79c04438e89883f2a9435abe1db354b1d169323f8d1d41fd5871c98b20caa4aa46bfc2c7a7f855add2259c840d5ac696342b6b5149d04b6671165095116621d814a626db8cd65ca3d3b58ec5486da4f6cd27b22d371e6b0a034f46aa99e8d250f48400eb87c9b95259eafe889a8522e69a9e080420065defaa6814f9e61208896da7434b789f9e39814c8aa0c3fa7b9890fd136e373b7a6cb2832866abd817051a7f7aa7ec8ab1ee17f6575ad9133ca5ba5cf51685aebe493cbb83a0d1ef19a9b4f2e818443f5a5fd9be3dc6b8da4051715fcd612148ef7f0ee92576af2888fafeb3734f98183e5ab8d51c8c4fe961040254af45e4140c3d63c2d9bdcd72c74a0a60d7622f137a15f3a1ea562eaf2190b22f45e8edf3cde3de1d7b8c7daee5591af5c2f27051da2fad34468e644434a683cf302d49f1d60f476abcf058f4b6173bb14602c0450108e302169d28ad248e877e30eac4c111e53ba17f04d38d76f4a66c3df85856b6eb3a3f7a9ea1d89bf853955a27d4cbcb045c2267cc8dd377ad1298c71a6d8e190451c094f6c5c3bb968ce616f71ebba787e70f8e02669dfebdbf68794a9e38d46da84f1300792b46d428960277210a236aef725d54ab500c4cce65b650393401391d28dd037aa77d8b7f50b5dd0ec489ba2cc42bed4a3c6cc55aa34e848f509ced5883803660770aee7f9587862e7fccda550bd341cf8106121c1806c080e9b335973581043dee794a75f95d0d812b44d8a5264dc66826e32c090f576ca17accde5f6d9cc29d28bed7ec6bf4f77b71ab9cec3e2b209b9386bab1d86843d5b7b6b2c7fda5b30749ccd72430c505221a61236404ca35ca29a99d4eccb7198347b3bb2896609cb8283e475dd8accb1699530f5d04ca9b694682e1b7165d011f2a789e29f9a774265469abd97de910eab9f48a1aa156a65de79bcf3db3c1a3ce7a5f7b3d76d5d66f0a94cce57196b1680943d8bdeff9ace84c7b3a5829818a41da5c7d54edfbf8dacd36a7ebd66ad6579623aba23222c3158331eb32c39b2d7dadfe0a07b664efe8c6d4fcc26d1186c009bc4e7081ea2c0e777c256df93c7311df6ee3d0ad65ad550c26c16e122e8c6e3e32f0f01ad552f356972e3c5d12a14ddc8b1d96e3ec05a1a978558cd77178b490f9dac785e44cea2523bd8a60bb8d10b9cb647209ca7b09fd98880e611d4d58e2f51974a1bb7225cf93d737fc93f5199d2f54c54f5bf8e5ecb95ccd94b4a40c512b91d8a422dd4b9d82593c20ca1d1cf0c90043a3932fdf9ded06b1e743a7f3f53abf08e6e9ff68dd6ba55c1f7fa956ecc1d88c313f7f548175234e6e9e8665df5f9b1cbc7aa963e5ff3a39226aee081ef57d18388d9b858445cfd0b35056550cdeb9a0bbba88cb517b493fb2f0d764709b756c3728e787d119bdd149bab9e92534e61a95b8cb8de78394653cb7b0be9577649d83816457554ba4bb70715d7d35495e562e0210fe6259f426246268c070775018cd1d50fa71e2177ef13b2166d696b7e2c2d137420d6ed2f9db5c00c9517e525e47bc44c3f513a25211e6e90ddc93216f454b9afd100fb4a114219d360c188c4ff6a5f8609f1a08d1940915205d75d57a1316c31fc918c36c2401561fd92f8bff7566c00609746ec53018468ec88db63e6fc42ec265589fde1a2a195ea9a801bdad9af04834b490d62225a2c3b81026dc57660aa8fd1fc4ef058722ce199a88317d5833d1a22c5d13e5ed80885b2e5282e3d3f6e20765fce52eb56f80ceaa08b2472fe1dc35fc54c728c3db9159fbb517c2dd86cf23a1567193ed883349a0715cef6b27d521b36806fbee20b9016d345497306ab1d28fa4ce3cfab238dab29e4c5126dcde350945cb91fab9ffe41b1a823a9133d32b5c15da191fb9ce65e09d6d47b2b9fe160a30400b611c0a859feed44974cabb3f1a819c8f85f8c97bc064ced5f3a0a623d17ec6d0a190db68fc08a72548994ff8cd5666e33656f1ac7b0cb96719b76c971ea59add9db5e619b4f610e3c151e52ac7ffce80bd28ff592dffc009eacd2c5aee6700fb6783fc54c31da2791fbfc0dc0cec8c69173e40f20cd575374f4bf66159ed59a4aa9473f9ab732c545ba3d054fb687dde020a71515c71f61512b294cf0e17e428d5a865ba8eb2ef9b4798be48da597447d11ac8523187e7574131074447efc51019536893e4bd2ed798cf0dd45cec8b71eaf63eaf7f866ce133b5eef6a260571e9250bf1793525a06daf22d597e49f8bc685f2a9a5a8851ab221904ede92e5f95d308df034bfb3326123fa082ab6f6df8bb1fb281ea3d7255aecb1f07e4d5f20ded032d13da1792d0e6f1030018f8a22938620053b915d6c475430a32104b48a2049d2c88635ecf8a9f5bc4da6a1880f6dd6606646b123ecc288546f9cc1911b56acb05937b9d450ba3e7de3b0f8f7c21999d8f14e012134771805edae5dd81967e389bb6c887e98bfa6e140f24c6115afaca6da285aae8931461ad45c2c099952490d2fe089be0ba43d518ed6eec310e4134520dbc4c60898c90cd72d8b07b99ea95d2d8780dde4d61e92f270937f54c32e76c031c163a860a6a7139326fd278f172526d01016940d815bd54f3878e0d8d131f691f469a8ae7b72729ae4571bb98fab9254f714a2f32f13ca5445bc14c1e06518075a7ea9f4ee76154ebb16b5b18752120b63ed5a3c05f9eafabb212edc025dde0b12668b9acc4260c45e4899de237471c6d3c4f67f8496e6747eb65685cd3020d25d1a581439e72cf0bab23e113e8eca6533f5cb297e4c4607a69a897ad3447c6f84a7238ac4a0bb0b9d55f1db274068b1d88375ce1c1792c314bc1b8ec6fe417c281ef0243670633b4bea3af10e1e32199958eaae4fa8c7445914157be24ea00fdc8a4cb88703006546ee898913d88152b5ec580484d6cd95f641a92d72a88dfadee452e99574b891462dba0e0a6e11876496b962adbbe6da2af4dd48362c4aedef8167cf26ce5cb6bd7af63b5f2cdad1c0ee2e122a5ff0282228d43d6604ceaad37c88c6139368495096bdba0869a363da37f836e5bbcbd41762255515724a0a622200859ae56400f03d0a53d7f3c71330b2c42abda1da4553da0f2fd0dd1a1a4bfe87280fd37589500004c0001004800070000000c0001006d697272656400002400020020000200000100002e07000008000000040000000200000007000000", @ANYRES32=r1, @ANYBLOB="100006008f5d0842714b35b5811616000000401001003c10040000000c0001006d6972726564000024000200200002007f000000840000000000000003000000c1cc000007000000", @ANYRES32=r2, @ANYBLOB="04100600febc77d8a838c5f88c842a7591613fbb8b559dc30c8ab74d782a89eedf95ee2d13ef14c7a3c426a10f62f81e160249c79e105eb85ce95cb8cd9514fad303cceac7f939ecb6322113eeef1a64bda27bb357f39f3fc2bb4bf5f3f8469f22380bcfaad4bc5322e52016b96955691d67975b495a37bb77bbf8474645c81c50bc8f0832fae1cec6cf35fbf05b45f70e533a74dde24a9958271d191a134f2dd0d74d1c6e17c86a03bd998e908afa9bf48b6ec237eef4e0698ab0b0107b8093be176514f5ee42f53cac6ff1609b87f87ad3599d7899e708af8ba3d15699bda7a3e11c2ef3d6cdb84e6fe2fc5209c17a844c66136f9303954f565f95ee8a3aca8111aec2a036782f201e2be8befde0bcdec8783ccd9194a16188e6b33dba1d82c01a76a2972b3643a4250001b80f5465ad4d389e7ae772778c52a31eb78c556503e16e217702c651860a056a9aafb7b9f9d586ef780acf9939a1df58dc7a50549a4138841e339326daf9f9ee747766a25ce07981f2ff261477c38c4336c2c204c05d769b2cee98b6f7e9ee047489f0a23af412cda925f7eea06773f5e363dc422e67e8e1f51652856fa5307610d2d4334ded15c6c04d198dd4dba25f249a08b1879dc2db39cc88d0278a673ccb68a530dde2c0c2138c6df5bdfb4d633e0e3b73eb044bd38b3eef0100f70135dde5f6c5e9152c51e374ede3fe9ca3b95f0939ec6edddabe5a1bb5c74db5f3a269373da176c0a77f53216c998189466a8ef5fe88e32f7f5937665c0882b1ef7d2e7d57cbe930699d5f6d96848c0ae85fde38072c862e7a74e3ec4dc8d9589c62d012dd61bf57990c07699ace510f0382020921a6d2d18985abefe378d1ff996bdc06f0e1b5dafcc3dabcf6a0b092467218fe6546374b0d8c7007c7cad99d649ba62fe0d9070a2515ab8ba6f49f53a1bb998883c3a606dfd9c6e212ad20c17b62e4fdc79ae5aa1a40d494551541ba9b246f5771f66b58bdc09a7da03b73f4f15bc9790325181ef90b367088008b1fd2ae819485f5ec6debf3bcf45b34c4f3f73ebe830549c6267829b5d5d847281d101c482c12c69c37319b68acdef0a1982b334359a42d78dd9f11ac4ffb1f51fe65031eeacafcb9dcd59d6d9617a846f17ba70516ed795b3dccf8f31f6e0b9425834516eb25fbac055f5d742c26e4f36e073a699fb38b79ed41e907e6819c1f38ee8aed0bdc5f736e1a3a427f98baec7df8c280e3c5ff6f4a0d571640914400b8b3d726fa88b1fc2c7d94ef11ff9ac5b093fe816d63139370e98774e37e531c7cbb1c28fc95e4ba762b9d1872dc2cffa5be3c6b51427c992df557e4957b4c4e001a57dd355162db1d2e397368bb300e3ba9109bd5f9ced6e4dab0bfc09218feff38281e8c7ec4838fba25face267fea7a2346377236bfeaff3a9419b3e3fc9c38e8dba19bc634b0af076e3f085a47ed599421ee1c6060b4b2fdf2e88139b3cb43f84fcd4c0b2ccb3bb9d8de351f22aab93b316cc31ba7df799ee929db8cd5a49354b9b5408ad97da7105837e2206e03955b612b0cb00e10d85642d16110248197286643a38c226854ab9b04bdadcf5212db58c22bad531f1bed6e5bae191a4433e787b87f6ba92fefa345bd724813f6ef35e1557ec571e166c9dc0185968ca5ae107137889ae9410ee4cc73c1ab57acb8df8c2e055d553c54823306b2412d3c0328c1458cf7144e23b2a147c80d4d4be86cf75dce16073dd8e009f56a086bc254adc10e011c3119e3714ab7868a6bb6639bde57ff6585cea9a566b1a0c3c6d38b36bdcfbb36dcc6cad800772b6104bd179bccd96935abdecbf0dc02951e9c02887d03786012cbb87272986f89bdada7bd9fc1c9d171244ac447ef496635ab427c67bcc5f2b80815ca6d5ade850f51c89cd2133dbb8a5000f6d1c62d0f29498c13b1a38e3dd34d454274bfeeb052b2bdadca6cc0e8d105ff086657eb00ddffcdb816f9438c27662ff5b85b0473575f0bbfdaed9da5f8c7e6fce796642c7edc3979344bcc7a7a717741c33d09276a8afbade87a11ea1413d683f7ecb3f55eca909a43cc980b64d0c3578ec4b29f6d2daa35c5a9a40a8c675e5c7ac8e1d80d0e05febf93f1e67f1333ba6ccf1af505ce1c55532f2e7114afa1026be62d36daa7e8727fc3dbece320fcf946bdd88dcdc26c92c8a10e1138d009bc21bd96f377b005d86e78012acb11c80d046445bec52cd7ab9819d9712ee9b09322325801a1bcace0e5be4d4895f5b405ea41be6fe61f2566c39f2efcb2a2074f5f860ec181ab89b07774ae03f03b00086411cf885616a321349fc0ee9e87ff43345c4128631ef6b5fc97b9cb149c40b9e1458c0a2287b808e983bc5e3306e0cddee2369148fcf360798f2e277f756ff6541e79859b817294db5f577d898a4ace83949f1a4ceb2124132c1e9e0d7d68821ffcaa60c4b0dd6bf305f7455e84ebb0c6ea73ccb9b26192bc7d2810b3bc5602a1383b2aeb03fd3adf1411b7586179fd976e55b081ab7c2dc78ab8c85b56be85cfdea7d98e8660c7feadc9384120747e2c4c6f19bb0ac594530d2e062686f3bc5e6985a440c39971cfcc46183209e9a917face4d298881856ca71bf5a247cd22dedab9e36d581f48bf3dbdb3ce639e596b9be28136baab5b23935a65d9786cdf50d6b270c63fc3247c50dde3afcf07f0e567a7ed24599f2025ad00d3b956fa72dba4e5fed50bdb9677c6692bef5f6087a92aacc2b5650320c5af75756648d04d28bc6745e21098c573b74bb878806b40bd812da2cf28952338699d2bcacecdbf8e7245f1cc0998eb90d314efa30d85ced90afd87609268f46436911fab8e7aa30bcb5dcb2bc5723b7f5a2320d799b93d990664b907257d3186ac8f8b28cfa23c3ba196bf3a7c5865a7d875cddc32d9b67282d406a41e21a49497b92d0905780343dfebdd47653f8b3df817ba6d85e26e843f4193b246c15804c0b3c62b66c3567932efd31c45ddd4b59b192fa5434938080c10938b55ca9f0c9a2aa1d3ca5de4174328af44a24c73fc32a59235e3358e9de6c92920cb17329d7e7ba9f478dc0c542a256c19fb04373afe1e2ebc6aea1ca434a687bb82ebc154c50efe20a4644ac8679a93e2dbcbc7bff4ab27176d982fd3377ee9f16bc1103a21ba3bf37888cf528c0984b87249cac3f8573bb3ca12021bcf9ba80fc2be95834a9f288be3c6671466141f0e189b52772094c5258b5b5885415ca6c71f26ebcbad82a39547900d5b128b003b79ba5891de291816739e26d1dabbe3ab5ca06c91c576824a45b4f9b31ce399b6818a14a98cdc17b2f4b53eedb7aba58fa8f8fb096509cb77c48784a6bf6a2d96af81a16d16770b28a5635bc5cee2707e9972a55f6e64758663c91917afe59f1aec1dc94cd5d26cc247488a31865ce3ba0a36a0812b39cb18289f93f7238b09edb93ce6ffe497aeb3de21f40622784ef59a8171df55f4c175898cc8f75d1814dfdbcbabfe1278dc62befdcfe6aae8d04d8e36ef5a1a5984a0844de80685a74429b4903e6118046a0afb696d37f97a2edd58936f77c3cc1192ad3deda601ce71b3eb58365bec758f88ec6a6f91c029ca8512396101ed95fa0ef6d98415ed873eb760e499a21666fa2301874e8f89b55b28d19df2c22f09f4e7e3332c9816cc87ed4447313fa5b51a8fd0138e03b0a3432b1f76ee4a3bab88a52c98c1094b82d76b01e377562d86e1653001218a0b79725214e1074dfca1a0dbcae19ffc5c8e1dedd6fe1a7ed43b41a7601a3b9bebb689be3c90b1600603db713a4b8c691d64a449f995749999e5a750fb9623d339b63d50ae1241a7b2aac21476349b26f5f69494d36f360cf8859a04bfc294d408f1a469aa7ad74528b34ba6bfa314120e5a2d729a02332100ac8e68d513ebcfcfafc80f40e72dbcdcc2f8e2e707be975c66932ae290cd6d95f1897b7ccae1224d8989f39facadfb6aeb9533ec3733d72b530ba551daf955ad15ad68a726acbb93d779a978701fbb5d525a73acd1d9da990e6ecd719b60eb196bbcbff9e64ffc34bfdc4aacd9cb7bdfce40fd563728f518d0b15cc771ee0fdf01d11401851e0365f149f692edaf25d8d01c28f53e5d34160bb5eb0c6d73e57715b81479f1b379b74039798e4290e0f55785865c59cd577e846c0b48503a3d3c1db5d02778394315c3f44c41f59edaa2645d6bd87f3de33d664dedd25080571fbdd26778d2fa690966742e0778cea4716d0bfeced8d944b9a70b908773c6ad18947592ef49d49b6ff21437a93a835e5acbc5b707680a0e5ad99c824c27e611538b75d604db0de00faa5b2eab536f23625667130844c13f3a616965bf4aabbf73464d5430bb1dddc0fca199dc403513ae32b532b68f2c3263d8002e3ab6d137c0c85c55dd1a08d255c7ecc660e01223b72afd6afce78c50caa573c7a2e235b7f06e562d67c6c9e81ee255c4952873dba5da10c8ed869a0b8ba4a8aadb2b90c58cd3f41daf43cde7e971338688ff2fa2ef6cfc9c47a68aca453f2d7dc1bf8236950fe7569aeb5c7dfbc2b08c81369b75e9c5c3e268e88284c5ed2ef530b94bcc6083c98d6dfa0a485dafb961ceda9d7df9bf989d4917ce57f726544b2d21f6a3e0b2156c180974c5fa4365482038d4ccb0f406b0de7bb3f100133b0ecc1ed31c44021cc14d2b3b44c498294b948dcf98bc169fec0b9f0103d6a43f2e9ee26067a8fd5b27d59d18c930decb13df9690d372beed0df745ce2c37ed6f3b9c0f6235c03d9a8a45a15ffce12be841156773aefab9ab445c9bb26438e8f2ce562e4ea81541a67a34de09dada5499127450dd9fa386a143659a9df53b2988a69e8e7d21f05342b7ef99412ee2044d211afae7ed18e647a0ef891e67f5573ea521e9eb480dac2bf58296a2be892189d9578c3b6105d60c3d8dc2e0744dac1e77fd6f467b77bbd9c56787ece8760fe3c0e3dfdf249c7cabbfcbcb2e2053129bc6ce42bf1592b1d4128ffc91869731a0e28dbd01ebfb653872c5e561f34a674fad985a7610ea66c52d2917bfc9b4f4607d036bf87581a16df4408a0e79aa1285fc9b15e5ee558e7e18be06090a694bd246a66d87d2d5b4fb2a00afe2d2713c6e5287a543a868e851dc57cce13e1e4c2419761f6ebd0086f4a2f350b0b9d57ead3469fb79c6396f90af1f697cc20f94179d22c551b1ff7d54afbff61d443c43b9585d200f50e6f1dad2fe82785df1ddc364e6d3a22c53a585f9471ccca407e33388d7ec32a7b6753b24bbf75c732fe11d9f86340da3730b1628dd0fe76d63fce92cbb8d442ccf5b03740356aafe57a271b3a0714beb558883c64b0292778c1fb9bfec73a46bf790995b0299b21792879824c5fee5af828e4d1bb819c7d6c6c4af62a210f396fae3bcd25d21625cb5faf3d1e434d060d6ae482e16ab9c85b6e3e990364f3758f84b2fdaee4bd36b29647454d63992deaeee2cc72f8d5d0131bd9600679d106784eb2013337474dd16d7848f8b5b72f49d6f982f580bbde152595af137493cb2bf1c4742cd2f947552ffc942c1389435ddd95b9b4f216d53664ec2b680832df9ae5ba5294cd7c04e23085798efedf4820fd3fed218cdafb04a60185f744908636aee30cb9aa718add0ef2448ef4a9a2c6061b998c06d5c955c21b074cdd4dc23e41a854a06e7e9c1c2fc0f5e7c982de8b2719e680fa14ce628e0490f421d923b3e983f72608d31757cda40d4bad461bd523f3188e52100a86fd12cba0db146f35bae84cfb15bd750f8509d07efdd71f86c062049943e96b0090000"], 0x6a08}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000041) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x20200, 0x0) 23:12:09 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x2000, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:09 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:09 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:09 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/cys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:09 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:09 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:09 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:09 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:09 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/dys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:09 executing program 5: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x2000, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:09 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 607.865286][ T8073] device bridge_slave_1 left promiscuous mode [ 607.871573][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.935459][ T8073] device bridge_slave_0 left promiscuous mode [ 607.941700][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.684732][ T8073] device hsr_slave_0 left promiscuous mode [ 609.754403][ T8073] device hsr_slave_1 left promiscuous mode [ 609.832587][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 609.844933][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 609.855829][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 609.901221][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 609.984817][ T8073] bond0 (unregistering): Released all slaves [ 610.088818][T14337] IPVS: ftp: loaded support on port[0] = 21 [ 610.153006][T14337] chnl_net:caif_netlink_parms(): no params data found [ 610.185042][T14337] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.192193][T14337] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.200271][T14337] device bridge_slave_0 entered promiscuous mode [ 610.208547][T14337] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.215737][T14337] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.223330][T14337] device bridge_slave_1 entered promiscuous mode [ 610.241522][T14337] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 610.252162][T14337] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 610.270879][T14337] team0: Port device team_slave_0 added [ 610.278561][T14337] team0: Port device team_slave_1 added [ 610.347026][T14337] device hsr_slave_0 entered promiscuous mode [ 610.414642][T14337] device hsr_slave_1 entered promiscuous mode [ 610.464371][T14337] debugfs: Directory 'hsr0' with parent '/' already present! [ 610.530535][T14337] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.537712][T14337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.545089][T14337] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.552152][T14337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.596510][T14337] 8021q: adding VLAN 0 to HW filter on device bond0 [ 610.610920][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.620168][ T3012] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.629244][ T3012] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.643241][T14337] 8021q: adding VLAN 0 to HW filter on device team0 [ 610.656586][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.665380][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.672441][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.697304][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.707079][ T9261] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.714203][ T9261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.725366][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 610.741939][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 610.759035][T14337] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 610.776786][T14337] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 610.793673][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 610.805324][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 610.813790][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 610.843783][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 610.860212][T14337] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:12 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x43, 0x40000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000080)={0x8, 0xc, [0x6, 0x8000, 0x8]}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$isdn_base(0x22, 0x3, 0x0) 23:12:12 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:12 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:12 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:12 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/hys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:12 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:12 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:12 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:12 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:12 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:13 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/iys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:13 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:13 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000500)=0xe8) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000180)=[{&(0x7f0000000240)="62420ca390b26de39c8b56bf420dad9487b8098307ffd3a048d2a3fb2cd19eea85d5d8f02320a8005b5d943539fc06346edaeecfbdb81a4d0cc0080f21e639b12733cb039009615cdb5e27575fb1d8bb95c52630a05e53b0c0b3edf5c1e5c6d99deeacf88c60fa6f8f96baec2a3f56671834374561161c01724f2e5c154459720ef8e7d7605c6b9a38489edb4bb979ec48b5d5128f2c2ea7d902287df852635b19db78eb26235addd7f1523a013e87cb3e38d484bcdd48c85b", 0xb9, 0x200}], 0x2000000, &(0x7f0000000540)={[{@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}], [{@obj_user={'obj_user', 0x3d, '/proc/sys/net/ipv4/vs/amemthresh\x00'}}, {@obj_type={'obj_type', 0x3d, '[*'}}, {@uid_eq={'uid', 0x3d, r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'keyringvboxnet1security&systemwlan1.\'ppp0.'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@euid_lt={'euid<', r2}}, {@permit_directio='permit_directio'}]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:13 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:13 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/lys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:13 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:13 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:13 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:13 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:13 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:13 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:13 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/oys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:13 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:13 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:13 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, 0x0) 23:12:13 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:13 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:13 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:13 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/pys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:13 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:13 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:14 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:14 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:14 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/tys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:14 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:14 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x1ff, 0x4) mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:14 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:14 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:14 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:14 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/uys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:14 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:14 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:14 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:14 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:14 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/xys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:14 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:14 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 614.089600][T14493] IPVS: ftp: loaded support on port[0] = 21 [ 614.262879][T14493] chnl_net:caif_netlink_parms(): no params data found [ 614.410850][T14493] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.422216][T14493] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.431233][T14493] device bridge_slave_0 entered promiscuous mode [ 614.439324][T14493] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.447347][T14493] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.455482][T14493] device bridge_slave_1 entered promiscuous mode [ 614.594488][T14493] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 614.605525][T14493] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 614.742265][T14493] team0: Port device team_slave_0 added [ 614.750005][T14493] team0: Port device team_slave_1 added [ 614.796867][T14493] device hsr_slave_0 entered promiscuous mode [ 614.844504][T14493] device hsr_slave_1 entered promiscuous mode [ 614.914309][T14493] debugfs: Directory 'hsr0' with parent '/' already present! [ 615.048826][T14493] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.056172][T14493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.063538][T14493] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.070673][T14493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.226688][T14493] 8021q: adding VLAN 0 to HW filter on device bond0 [ 615.239112][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 615.247882][ T3503] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.256086][ T3503] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.264461][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 615.396449][T14493] 8021q: adding VLAN 0 to HW filter on device team0 [ 615.406323][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 615.414971][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.423300][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.430404][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.444870][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 615.453464][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 615.462632][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.469832][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.478865][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 615.489821][ T8073] device bridge_slave_1 left promiscuous mode [ 615.496786][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.565236][ T8073] device bridge_slave_0 left promiscuous mode [ 615.571430][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.606136][ T8073] device bridge_slave_1 left promiscuous mode [ 615.612335][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.655333][ T8073] device bridge_slave_0 left promiscuous mode [ 615.661596][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.964786][ T8073] device hsr_slave_0 left promiscuous mode [ 619.004376][ T8073] device hsr_slave_1 left promiscuous mode [ 619.053514][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 619.066502][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 619.077109][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 619.118093][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 619.214806][ T8073] bond0 (unregistering): Released all slaves [ 619.374795][ T8073] device hsr_slave_0 left promiscuous mode [ 619.414284][ T8073] device hsr_slave_1 left promiscuous mode [ 619.461105][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 619.476038][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 619.488393][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 619.548006][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 619.633093][ T8073] bond0 (unregistering): Released all slaves [ 619.758481][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 619.779444][T14493] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 619.790180][T14493] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 619.802981][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 619.813544][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 619.822027][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 619.831261][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 619.839764][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 619.848035][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 619.856512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 619.864926][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 619.873241][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 619.881092][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 619.903051][T14493] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:21 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) syz_mount_image$hfs(&(0x7f00000003c0)='hfs\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@umask={'umask'}}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:21 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:21 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:21 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:21 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/zys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:21 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:21 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:21 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:21 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:21 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/s\\s/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:21 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:22 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x4000) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:22 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:22 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:22 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy#/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:22 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:22 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:22 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:22 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:22 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy%/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:22 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:22 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:22 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x7, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:22 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:22 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:22 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy*/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:22 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:22 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:23 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:23 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:23 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:23 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy+/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 622.473775][T14616] IPVS: ftp: loaded support on port[0] = 21 [ 622.537328][T14616] chnl_net:caif_netlink_parms(): no params data found [ 622.562003][T14616] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.569247][T14616] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.576843][T14616] device bridge_slave_0 entered promiscuous mode [ 622.584693][T14616] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.591842][T14616] bridge0: port 2(bridge_slave_1) entered disabled state [ 622.599873][T14616] device bridge_slave_1 entered promiscuous mode [ 622.614109][T14616] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 622.624802][T14616] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 622.642127][T14616] team0: Port device team_slave_0 added [ 622.649211][T14616] team0: Port device team_slave_1 added [ 622.826951][T14616] device hsr_slave_0 entered promiscuous mode [ 622.894442][T14616] device hsr_slave_1 entered promiscuous mode [ 622.944991][T14616] debugfs: Directory 'hsr0' with parent '/' already present! [ 623.017265][T14616] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.024529][T14616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.031891][T14616] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.039038][T14616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.132039][T14616] 8021q: adding VLAN 0 to HW filter on device bond0 [ 623.146636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 623.155156][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.162887][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.171437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 623.243202][T14616] 8021q: adding VLAN 0 to HW filter on device team0 [ 623.253772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 623.262878][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.269994][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.345135][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 623.353646][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.360760][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.372332][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 623.381658][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 623.392785][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 623.480564][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 623.489453][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 623.499457][T14616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 623.517290][T14616] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:25 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:25 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:25 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:25 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:25 executing program 1: mkdir(0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4400, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000180)={0x3, 0x0, [{}, {}, {}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:25 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy-/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:25 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:25 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:25 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:25 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:25 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy./net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:25 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:25 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:25 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:25 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:25 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 624.454279][ T8073] device bridge_slave_1 left promiscuous mode [ 624.460584][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 624.515164][ T8073] device bridge_slave_0 left promiscuous mode [ 624.521772][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 626.194886][ T8073] device hsr_slave_0 left promiscuous mode [ 626.254471][ T8073] device hsr_slave_1 left promiscuous mode [ 626.303656][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 626.315252][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 626.329672][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 626.378485][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 626.443181][ T8073] bond0 (unregistering): Released all slaves 23:12:28 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000180)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x3) 23:12:28 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:28 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:28 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:28 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy//net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:28 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:28 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:28 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:28 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:28 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:28 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy0/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:28 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:28 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:28 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4880, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000080)={0x80, "e301e0b903610e837726c4c58b303f8dc012f6426d1255988be9dde82972a8b0", 0x3, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000180)=0xdf1) 23:12:28 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:28 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:28 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syL/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:28 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:28 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:28 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:28 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:28 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syX/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:29 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:29 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:29 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 628.322518][T14751] IPVS: ftp: loaded support on port[0] = 21 [ 628.405280][T14751] chnl_net:caif_netlink_parms(): no params data found [ 628.433410][T14751] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.440677][T14751] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.448368][T14751] device bridge_slave_0 entered promiscuous mode [ 628.456958][T14751] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.464354][T14751] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.472233][T14751] device bridge_slave_1 entered promiscuous mode [ 628.492799][T14751] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 628.510516][T14751] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 628.528895][T14751] team0: Port device team_slave_0 added [ 628.536229][T14751] team0: Port device team_slave_1 added [ 628.625919][T14751] device hsr_slave_0 entered promiscuous mode [ 628.674634][T14751] device hsr_slave_1 entered promiscuous mode [ 628.734290][T14751] debugfs: Directory 'hsr0' with parent '/' already present! [ 628.864523][T14751] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.871709][T14751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 628.879106][T14751] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.886188][T14751] bridge0: port 1(bridge_slave_0) entered forwarding state [ 628.978831][T14751] 8021q: adding VLAN 0 to HW filter on device bond0 [ 629.050263][T14751] 8021q: adding VLAN 0 to HW filter on device team0 [ 629.057935][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.066236][ T3012] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.073847][ T3012] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.082134][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 629.165311][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.173841][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.181030][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.188793][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.197950][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.205285][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.284674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 629.293213][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 629.302166][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 629.313576][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.389512][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.401342][T14751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 629.432657][T14751] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:31 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:31 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:31 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, 0x0) 23:12:31 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sy\\/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:31 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:31 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:31 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syc/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:31 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:31 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 630.272512][ T8073] device bridge_slave_1 left promiscuous mode [ 630.286993][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.335250][ T8073] device bridge_slave_0 left promiscuous mode [ 630.341496][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.004724][ T8073] device hsr_slave_0 left promiscuous mode [ 632.054293][ T8073] device hsr_slave_1 left promiscuous mode [ 632.103175][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 632.115547][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 632.127017][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 632.190260][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 632.282720][ T8073] bond0 (unregistering): Released all slaves 23:12:34 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4cc, 0x200000) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x1b) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:34 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syd/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:34 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:34 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:34 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:34 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:34 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:34 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:34 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syh/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:34 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000300)={'raw\x00', 0x76, "ff56a07824a3b40fbc01b2ebc2f11da54b52c38894a4aec8390f581a1520ba0341c1c2c529e1e78e43d3aada001c38531c22fe874b7fcd6a565bbebed9baae79c087a3e5dc1eef5442de970f0e3d209a0f0cfaad3072a7a6f9704812010d2d56faa9a874c77fc4e12f6768c64f294417f354d356dee2"}, &(0x7f0000000180)=0x9a) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000003c0)=[@in6={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, @in6={0xa, 0x4e21, 0x0, @mcast1, 0x1f}, @in6={0xa, 0x4e24, 0x7, @mcast1, 0x100}, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x24}, 0x20}, @in6={0xa, 0x4e20, 0xfffffffffffffffa, @rand_addr="6e68accaccd411878d09b9feaea50a4c", 0xb11c}, @in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x200}, @in6={0xa, 0x4e24, 0x5, @remote, 0x1f}], 0xc4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) sendto$llc(0xffffffffffffffff, &(0x7f0000000240)="8559969b75058752883b0c046f74059e249b7be9a18e5a30d68f8d17c9428631461c62b4c48a5b374282fb4232d1165863dbad58e9bf97ef1f04ed905163a37542de24d2b4e6fe74c41dbd1cd1223194d4beccaa52fc5f4a0cc8c59ccc465af730b1bca85bc648db8147939dafef3e1bbc31ee8732dd55fdb617c5327e158b502e16f2ce33e05444682085b3a2a24074e69af2b68ffa60889b5bfbff426e84cbfea4e12e3c8ced4b231c9ba394f16f97783765c040", 0xb5, 0x200408c1, &(0x7f0000000040)={0x1a, 0x32e, 0x3ff, 0x20, 0x800, 0x7ff}, 0x10) 23:12:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:34 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:34 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:34 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syi/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:34 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:34 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:34 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:34 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:34 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:34 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syl/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 634.079098][T14877] IPVS: ftp: loaded support on port[0] = 21 [ 634.168554][T14877] chnl_net:caif_netlink_parms(): no params data found [ 634.196589][T14877] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.203717][T14877] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.211995][T14877] device bridge_slave_0 entered promiscuous mode [ 634.220741][T14877] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.228129][T14877] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.235772][T14877] device bridge_slave_1 entered promiscuous mode [ 634.253400][T14877] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 634.264233][T14877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 634.280469][T14877] team0: Port device team_slave_0 added [ 634.287609][T14877] team0: Port device team_slave_1 added [ 634.346888][T14877] device hsr_slave_0 entered promiscuous mode [ 634.384470][T14877] device hsr_slave_1 entered promiscuous mode [ 634.444188][T14877] debugfs: Directory 'hsr0' with parent '/' already present! [ 634.573478][T14877] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.580733][T14877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 634.588127][T14877] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.595306][T14877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 634.688547][T14877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 634.700943][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 634.709693][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.718742][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.728079][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 634.739833][T14877] 8021q: adding VLAN 0 to HW filter on device team0 [ 634.815483][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 634.823849][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.830956][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 634.839087][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 634.847959][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.855055][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 634.936307][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 634.947972][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 634.957952][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 634.966548][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 634.978807][T14877] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 634.990667][T14877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 635.057425][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 635.073472][T14877] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:37 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000240)={"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"}) 23:12:37 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:37 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:37 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:37 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syo/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:37 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:37 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:37 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:37 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syp/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:37 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:37 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:zero_device_t:s0\x00', 0x23) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x800, 0x111100) ioctl$KVM_NMI(r1, 0xae9a) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) r3 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x6d, &(0x7f0000000000)=@assoc_value, &(0x7f0000000100)=0x8) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x200, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000) 23:12:37 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:37 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:37 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syt/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:37 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:37 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:37 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 635.975964][ T8073] device bridge_slave_1 left promiscuous mode [ 635.982231][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:12:37 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:37 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syu/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 636.091021][ T8073] device bridge_slave_0 left promiscuous mode [ 636.098715][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:12:37 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:37 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x800) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000180)={0x0, @aes128, 0x3, "08668c59d46aec42"}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x8800, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000280)={0x1, 0x0, 0x2080, {0x1000, 0xf000, 0x2}, [], "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", "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7cb, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:37 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:37 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:38 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:38 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:38 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:38 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syx/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:38 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:38 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:38 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:38 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 638.434781][ T8073] device hsr_slave_0 left promiscuous mode [ 638.474333][ T8073] device hsr_slave_1 left promiscuous mode [ 638.521202][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 638.533999][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 638.545287][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 638.617949][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 638.708065][ T8073] bond0 (unregistering): Released all slaves [ 638.839936][T14993] IPVS: ftp: loaded support on port[0] = 21 [ 638.906110][T14993] chnl_net:caif_netlink_parms(): no params data found [ 638.930434][T14993] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.937989][T14993] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.945961][T14993] device bridge_slave_0 entered promiscuous mode [ 638.957904][T14993] bridge0: port 2(bridge_slave_1) entered blocking state [ 638.965121][T14993] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.972695][T14993] device bridge_slave_1 entered promiscuous mode [ 638.990682][T14993] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 639.052212][T14993] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 639.073850][T14993] team0: Port device team_slave_0 added [ 639.088967][T14993] team0: Port device team_slave_1 added [ 639.156677][T14993] device hsr_slave_0 entered promiscuous mode [ 639.214499][T14993] device hsr_slave_1 entered promiscuous mode [ 639.264186][T14993] debugfs: Directory 'hsr0' with parent '/' already present! [ 639.289293][T14993] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.296427][T14993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 639.303761][T14993] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.310975][T14993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 639.377318][T14993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 639.400943][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 639.425953][ T3503] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.433787][ T3503] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.453552][T14993] 8021q: adding VLAN 0 to HW filter on device team0 [ 639.474933][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 639.483346][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.490440][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 639.521747][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 639.531596][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.538704][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 639.566287][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 639.575302][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 639.583650][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 639.592832][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 639.603407][T14993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 639.612261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 639.634207][T14993] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:41 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)=0x0) ptrace$pokeuser(0x6, r0, 0x1000, 0x6) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) open(&(0x7f0000000340)='./file0/file0\x00', 0x20200, 0x88) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@initdev, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:41 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:41 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/syz/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:41 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:41 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:41 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:41 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:41 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:41 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:41 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:41 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys\\net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:41 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:42 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80400, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x55b, 0x4) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:42 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:42 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/.et/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:42 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:42 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys//et/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:42 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000400)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0xa80032}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x180, r1, 0x611, 0x70bd2b, 0xc02, {}, [@TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xe25, @empty, 0x36f1f924}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x9, @loopback, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x7}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x100000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}}}}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x781}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffe01}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffff000}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffdbd3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x4}]}, 0x180}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:42 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/\\et/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:42 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:42 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:42 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/n%t/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 642.200323][T15103] IPVS: ftp: loaded support on port[0] = 21 [ 642.378825][T15103] chnl_net:caif_netlink_parms(): no params data found [ 642.528351][T15103] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.535679][T15103] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.543294][T15103] device bridge_slave_0 entered promiscuous mode [ 642.554229][T15103] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.561360][T15103] bridge0: port 2(bridge_slave_1) entered disabled state [ 642.569149][T15103] device bridge_slave_1 entered promiscuous mode [ 642.707714][T15103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 642.718395][T15103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 642.736490][T15103] team0: Port device team_slave_0 added [ 642.743118][T15103] team0: Port device team_slave_1 added [ 642.897655][T15103] device hsr_slave_0 entered promiscuous mode [ 642.957692][T15103] device hsr_slave_1 entered promiscuous mode [ 642.994322][T15103] debugfs: Directory 'hsr0' with parent '/' already present! [ 643.003268][ T8073] device bridge_slave_1 left promiscuous mode [ 643.009626][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.035893][ T8073] device bridge_slave_0 left promiscuous mode [ 643.042150][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 643.085678][ T8073] device bridge_slave_1 left promiscuous mode [ 643.091866][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.146824][ T8073] device bridge_slave_0 left promiscuous mode [ 643.153049][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.445503][ T8073] device hsr_slave_0 left promiscuous mode [ 646.484335][ T8073] device hsr_slave_1 left promiscuous mode [ 646.532042][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 646.545047][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 646.556301][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 646.627942][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 646.723218][ T8073] bond0 (unregistering): Released all slaves [ 646.864909][ T8073] device hsr_slave_0 left promiscuous mode [ 646.904313][ T8073] device hsr_slave_1 left promiscuous mode [ 646.952171][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 646.964264][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 646.976008][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 647.018979][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 647.095823][ T8073] bond0 (unregistering): Released all slaves [ 647.250395][T15103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 647.262995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 647.273016][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 647.283390][T15103] 8021q: adding VLAN 0 to HW filter on device team0 [ 647.293644][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 647.302634][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 647.311302][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.318456][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 647.330626][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 647.346582][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 647.357019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 647.365675][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 647.372723][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 647.465518][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 647.496487][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 647.506100][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 647.515362][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 647.523839][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 647.533839][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 647.543633][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 647.552870][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 647.571204][T15103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 647.583342][T15103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 647.597715][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 647.609442][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 647.620977][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 647.660640][T15103] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:49 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8000, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1bb0, 0x1000000000000440) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000180)={0x0, r1}) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000240)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000002c0)={@mcast2, 0x29, r2}) setrlimit(0x5, &(0x7f0000000300)={0x2, 0x20}) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x82) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:49 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:49 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:49 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/n\\t/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:49 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:49 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:49 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:49 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:49 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:49 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/ne\\/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:49 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:49 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:50 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x200060, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0xa, &(0x7f0000004640)=[{&(0x7f0000000240)="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", 0x1000, 0x100000001}, {&(0x7f0000001240)="9be3ce26e2f358ee71ec94f77880cfad2d278bc1deb5262b93a18f5cc65a2402c7306296988353cf6b405510fff3aee2a6cbc25669b688b55e0f017051db541363cc09b1ce4bc2a0f30a2722e940f83dc779a62e471b19e8a968703e1d9fe8705a52c0b5f430b230158a031132cca8f79abca9b3d1a7fb1cf4eec3e887e15d2993f5511a36ab7d63e376d8cc3ab08e536bd0da2c89273a876eb85c99c0735b7da971031cbda4612a738794dea5d8", 0xae, 0x10001}, {&(0x7f0000001300)="0ee57a8aeedbed16bfb3d41341291b325e963bba41c66f53fe53a66fa1c10f4277842d8e304945f3faf3bbc2b62012e33780fb96bebb1dc10e1dfa92b2fe43a8eb9277086f7f304031aa7d9404cd2cda850ddbaf5e9f59fdde774c0d3a53d2a2971b4a340038fc85ce8dd1a85867fc8e7a049d332579159fcda485baf03eeece41ec4ac9b9301c27bddad441ccd43ac9eee75fb36db13309266ef4330ab93113781ec916b275f961d38f743a5b5a34b01f4b196a61d65f037e88442e7c48da1ae580caf8fb826fbb54cf", 0xca, 0x3f}, {&(0x7f0000001400)="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", 0x1000, 0x1}, {&(0x7f0000000180)="5fe9bf975aa50535a161bd0e573bca3d8e818eec586c24846b07557a2bcaf8896b8c589d43c6c4d581d79f5665b8019af380c470e30cf198dc6ffd969e5292eea72833597c37e66056c3a0d13c12115c089a4347e9ee7e0ab0bc", 0x5a, 0x401}, {&(0x7f0000002400)="e699ad27d7fdfde013b1583a063958d20128e3bab3d36b65b9be05c8c31c75cbe8c5200f57509089fc8477f3433b15b5cade9bd351d9fcc2ea44f1a6db129e3db95f8ea3a9baa2d4452af1572ddd88d5fd883d4d51c128495f5a484aa0b3c7181b074a87", 0x64}, {&(0x7f0000002480)="cf001d781d6fdc78f93de45d46e085672af95d474ceddd32d9ca379a6b6daac9da52319631e7e1b6252b5b4c83c417184de8d5e8a3a69855d3945f8e720e7fa8fed3a6fb885d826bae8bc673117576218f346cfa98478a1138b54072e9c06bf34924f5c0c74147ab15fb04db7bcb51ea7af83f95df846a9b13dfad1643be61e22e94a6611292d2b8a197491d8477e4d759384f79d7996d2103c9df5e433e3da04a9637f585baeea774844d71c8e5135bc06c9fa1cda598ed559c9a68c593ca103ef404aada1ae3247219b2522404a2d2a85b957569cd0f0a73101d3b0c7c2a7a9f", 0xe1, 0x2}, {&(0x7f0000002580)="1502e93418674b7cfe0ac0cdb8562ac8a045066245ae2656b15567055022b1f1790b6b476b946785e4811fac158e2561f4d4b5bbecbf2e762ccdd4fcb923331988db64291b6f29de2843998741b740825aa4e79ca1ea6d7e212deacd368a6500033963164193ca41a926a8adc668eb35a8711b9910a7650db3b8362554c7cf7a6e2a6cc65e29f9657ce3a196e1165a47ced6b8e2edbbe90bbe0ee03fddbb7ed0223baac1c6547a243d8e7d", 0xab, 0x9}, {&(0x7f0000002640)="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", 0x1000}, {&(0x7f0000003640)="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", 0x1000, 0x3ff}], 0x8, &(0x7f0000004740)={[{@iocharset={'iocharset', 0x3d, 'koi8-u'}}, {@hide='hide'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '/proc/sys/net/ipv4/vs/amemthresh\x00'}}, {@subj_role={'subj_role', 0x3d, '#keyring'}}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:50 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:50 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:50 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:50 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net\\ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:50 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:50 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:50 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:50 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/%pv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:50 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:50 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:50 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:50 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$xdp(0x2c, 0x3, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:50 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:50 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:50 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/.pv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:50 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:50 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:50 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net//pv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 650.516063][T15225] IPVS: ftp: loaded support on port[0] = 21 [ 650.630999][T15225] chnl_net:caif_netlink_parms(): no params data found [ 650.713054][T15225] bridge0: port 1(bridge_slave_0) entered blocking state [ 650.720352][T15225] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.728286][T15225] device bridge_slave_0 entered promiscuous mode [ 650.736269][T15225] bridge0: port 2(bridge_slave_1) entered blocking state [ 650.743367][T15225] bridge0: port 2(bridge_slave_1) entered disabled state [ 650.751493][T15225] device bridge_slave_1 entered promiscuous mode [ 650.823135][T15225] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 650.834223][T15225] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 650.853173][T15225] team0: Port device team_slave_0 added [ 650.919900][T15225] team0: Port device team_slave_1 added [ 650.997119][T15225] device hsr_slave_0 entered promiscuous mode [ 651.044564][T15225] device hsr_slave_1 entered promiscuous mode [ 651.084168][T15225] debugfs: Directory 'hsr0' with parent '/' already present! [ 651.156364][T15225] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.163435][T15225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 651.170831][T15225] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.177904][T15225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 651.273207][T15225] 8021q: adding VLAN 0 to HW filter on device bond0 [ 651.286723][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 651.295339][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.302860][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.312322][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 651.382358][T15225] 8021q: adding VLAN 0 to HW filter on device team0 [ 651.392711][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 651.401617][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.408736][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 651.420555][ T8073] device bridge_slave_1 left promiscuous mode [ 651.427605][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.474967][ T8073] device bridge_slave_0 left promiscuous mode [ 651.481144][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.184719][ T8073] device hsr_slave_0 left promiscuous mode [ 653.224431][ T8073] device hsr_slave_1 left promiscuous mode [ 653.302155][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 653.314711][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 653.325812][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 653.389969][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 653.501698][ T8073] bond0 (unregistering): Released all slaves [ 653.621773][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 653.630634][ T9261] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.637734][ T9261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.655577][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 653.664893][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 653.674869][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 653.683150][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 653.691711][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 653.700474][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 653.716800][T15225] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 653.727723][T15225] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 653.739280][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 653.748155][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 653.756835][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 653.765337][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 653.773684][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 653.793860][T15225] 8021q: adding VLAN 0 to HW filter on device batadv0 23:12:55 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x6c, r1, 0x14, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x53}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x44000}, 0x4880) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:55 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:55 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:55 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:55 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:55 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/\\pv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:55 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:55 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:55 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/i.v4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:55 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:55 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:56 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:56 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000040)={0x0, 0x0, [0x7ff, 0x6ab6429f, 0x8a98, 0x6]}) 23:12:56 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:56 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:56 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:56 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/i/v4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:56 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:56 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:56 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:56 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:56 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:56 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/i\\v4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:56 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:56 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000040)="b220097594687a201d63da5e4b4a4236e980d3e6fdc226b3094115399dc714fae81fe3f2", 0x24}, {&(0x7f0000000240)="acef5b9fa41569e88efa2c4aeff8e75d6ce204ccb6a3a0fbe646e40f1a3ce94d405cf073af3f5127b0b22175e5d93af3afec96ee5307d2bdc4d27a27902a2580e78890b4274fc235f392dd09891df0dd40a02acafed54ce34f1328aad837de193d35a3e802bebf362a268b0e7c3a670339afa34e99611494db7f9012fdcfbc6e4f1bde2161e79539bb88c0e3fceb5b3474ced96cb659bda2a7e1cbc0e98f68703eaec83f5b93ebf1aba9af736e8b405e93a81a1abc0fdac3e958", 0xba}, {&(0x7f0000000180)="afc6506694a9f6b94e532e72e45c381d029ab2f2e7e8b7d0c426bd08494aef8874e6fe461ec10e670166227cae09d52e2ef615877d3def5306e9355966f4c331bb4971ac472598786690fc416b0db9123da7e4c5d5b169ceb37dbba0ab57f820eca2ed5a1e1b68e85f795d753e2bfdbb74fddfc69b", 0x75}, {&(0x7f0000000080)="2741751adaf82ca8d60fac456b7edbd1580c2a08b160af20fb", 0x19}, {&(0x7f0000000300)="6990ffb2625cb5b3440323fff380e517f96e64d72e14717741d507e4346c7789ec6a84518ed34ec17cf9e862d1c397e359764a4e3582ecf684d73a6a746a27e4f9f1ad1057eef86a42adfd6595cd1d105806eaa9038a00d8bdc1e5ac5fe0c3f80ca5bb6697c6656d24eb417d8c9b4128fe1f0ec23b6e95619882db8890961b2233f23d68dab6245d5b06502a5a67a77bd7c4dbf562d1c17ac024e42d679c9ba1", 0xa0}, {&(0x7f00000003c0)="2271841b40f00eba33585546a42090a33f25b1de88414cf0cd99bdfaa5c82e8e90f75d5f2ba783518601047ee9f5b7b7f00d09f52e4b403e637bd38aab68c2728e58c39d109648a09224ee", 0x4b}, {&(0x7f0000000440)="76fcb46369775f9baddf2a6bfdc3b68680b778996c0713289452847db56149fb0834151c4aebafdf8ef2", 0x2a}, {&(0x7f0000000480)="edc81bc52408782afbb75c51f044cd82acd37a6019c3a3b68401e3f2dec29cc472837a47c95120f347be70ac68648ff552af75ad19fdd38de28b474b361a55730dbe3b2305c0f5e6da140067991d8a791d", 0x51}, {&(0x7f0000000500)="a77a26cef08cf932687ce48fd4f1cc4db970d6d04914f1aa80aa45ffe63701545324fe1472ac1d3f033b868fdb7554437b34b20478a346810d7496d8da496a1026df0d6330c5ef637c4674b7e9efbe3a4cb21ae99a36efacc2a094e9238e4fbee7dce425d04388e0a05321b4f766d2ad887c17ca113f783bc9b3497919a86c772a73f57b3f4c1a6c76cf8839769b3a1ac9039e98c2de545fdf9b73dca90bdb1ff81d0896ae7320e2a6902b627b36fa65d7e892d8eb9707d8afdfbed5ab0be384ae8381d69f3ae35a0c6441ac494872e379400518d15ff9109ab5d2490add015519225e4bfbf81e20cc6318e995bc3f75607b5a88", 0xf4}, {&(0x7f0000000600)="6a4b2a9b3b8a072ca0fa33d4675e1be9084bce8a01030a632046354e748f6d85e294393f7b732d67169beef2c2c6cdec2b15f4156ce4df29af65ab13f67fb5591aa59809a4a0347c3fec7ebfb3dc36642b2d6d5459d0e7ee2577bea573d154b031e008e1b6e0e70ecdfd8720af4a32b9cb355236af0c57808c27c29309822c4ad80bfbbbc82fce2aada2ea4dd945", 0x8e}], 0xa, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:12:56 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:56 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:56 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:56 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ip.4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:12:56 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:57 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:57 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:12:57 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:12:57 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:12:57 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:12:57 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ip/4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 656.605036][T15344] IPVS: ftp: loaded support on port[0] = 21 [ 656.718214][T15344] chnl_net:caif_netlink_parms(): no params data found [ 656.802039][T15344] bridge0: port 1(bridge_slave_0) entered blocking state [ 656.809296][T15344] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.817317][T15344] device bridge_slave_0 entered promiscuous mode [ 656.825199][T15344] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.832301][T15344] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.840274][T15344] device bridge_slave_1 entered promiscuous mode [ 656.913155][T15344] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 656.924584][T15344] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 656.941553][T15344] team0: Port device team_slave_0 added [ 657.009614][T15344] team0: Port device team_slave_1 added [ 657.077808][T15344] device hsr_slave_0 entered promiscuous mode [ 657.115424][T15344] device hsr_slave_1 entered promiscuous mode [ 657.164184][T15344] debugfs: Directory 'hsr0' with parent '/' already present! [ 657.238286][T15344] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.245491][T15344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.252809][T15344] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.259898][T15344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.349940][T15344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 657.361065][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 657.369752][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.378809][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.387441][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 657.459167][T15344] 8021q: adding VLAN 0 to HW filter on device team0 [ 657.470940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 657.479722][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.486826][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.515249][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 657.524833][ T9261] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.531890][ T9261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.542171][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 657.551983][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 657.561365][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 657.571232][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 657.639123][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 657.648671][T15344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 657.668911][T15344] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 657.685466][ T8073] device bridge_slave_1 left promiscuous mode [ 657.691697][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.725770][ T8073] device bridge_slave_0 left promiscuous mode [ 657.731972][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.384835][ T8073] device hsr_slave_0 left promiscuous mode [ 659.454209][ T8073] device hsr_slave_1 left promiscuous mode [ 659.513055][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 659.525359][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 659.536025][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 659.608302][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 659.674384][ T8073] bond0 (unregistering): Released all slaves 23:13:01 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000180)={0x8001, 0x5, 0x9, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}]}) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:01 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:01 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:01 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:01 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:01 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ip\\4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:01 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:01 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv\\/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:01 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:01 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:01 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:01 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:02 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RWRITE(r0, &(0x7f0000000340)={0xb, 0x77, 0x1, 0xfffffffffffffff2}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/raw6\x00') getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000240)={0x3, &(0x7f00000001c0)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000300)={r3, &(0x7f0000000280)=""/120}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:02 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:02 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:02 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4\\vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:02 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:02 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:02 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:02 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:02 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:02 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:02 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/.s/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:02 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') fadvise64(r0, 0x0, 0x7937, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:02 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:02 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:02 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:02 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:02 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4//s/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:02 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:02 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:02 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:02 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:02 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:03 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/\\s/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 662.282826][T15461] IPVS: ftp: loaded support on port[0] = 21 [ 662.339033][T15461] chnl_net:caif_netlink_parms(): no params data found [ 662.480846][T15461] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.488305][T15461] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.495969][T15461] device bridge_slave_0 entered promiscuous mode [ 662.503527][T15461] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.510721][T15461] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.518399][T15461] device bridge_slave_1 entered promiscuous mode [ 662.593667][T15461] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 662.604567][T15461] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 662.621502][T15461] team0: Port device team_slave_0 added [ 662.628674][T15461] team0: Port device team_slave_1 added [ 662.686904][T15461] device hsr_slave_0 entered promiscuous mode [ 662.744599][T15461] device hsr_slave_1 entered promiscuous mode [ 662.814232][T15461] debugfs: Directory 'hsr0' with parent '/' already present! [ 662.888508][T15461] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.895641][T15461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 662.902910][T15461] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.910026][T15461] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.006512][T15461] 8021q: adding VLAN 0 to HW filter on device bond0 [ 663.017876][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 663.027547][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.035228][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 663.043205][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 663.113094][T15461] 8021q: adding VLAN 0 to HW filter on device team0 [ 663.123616][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 663.132255][ T9261] bridge0: port 1(bridge_slave_0) entered blocking state [ 663.139489][ T9261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.155439][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 663.163810][ T9261] bridge0: port 2(bridge_slave_1) entered blocking state [ 663.171016][ T9261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 663.246971][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 663.255712][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 663.263993][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 663.275179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 663.349055][T15461] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 663.361079][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 663.370063][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 663.389802][T15461] 8021q: adding VLAN 0 to HW filter on device batadv0 23:13:05 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1ff0000000000040, 0xfffffffffffffffd, 0x0, 0x0, 0x7f, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x200000000, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) fcntl$addseals(r1, 0x409, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:05 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:05 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:05 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:05 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:05 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v#/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:05 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 663.645205][ T8073] device bridge_slave_1 left promiscuous mode [ 663.651470][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:13:05 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:05 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v%/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:05 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:05 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 663.753652][ T8073] device bridge_slave_0 left promiscuous mode [ 663.762639][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:13:05 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 665.654468][ T8073] device hsr_slave_0 left promiscuous mode [ 665.714291][ T8073] device hsr_slave_1 left promiscuous mode [ 665.782502][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 665.795327][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 665.806265][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 665.878067][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 665.964222][ T8073] bond0 (unregistering): Released all slaves 23:13:08 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x80) mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v*/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:08 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:08 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v+/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:08 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:08 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v-/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:08 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 667.999212][T15574] IPVS: ftp: loaded support on port[0] = 21 [ 668.101667][T15574] chnl_net:caif_netlink_parms(): no params data found [ 668.127490][T15574] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.134707][T15574] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.142262][T15574] device bridge_slave_0 entered promiscuous mode [ 668.150138][T15574] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.157311][T15574] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.165319][T15574] device bridge_slave_1 entered promiscuous mode [ 668.181167][T15574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 668.192165][T15574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 668.211022][T15574] team0: Port device team_slave_0 added [ 668.217983][T15574] team0: Port device team_slave_1 added [ 668.395818][T15574] device hsr_slave_0 entered promiscuous mode [ 668.437969][T15574] device hsr_slave_1 entered promiscuous mode [ 668.495075][T15574] debugfs: Directory 'hsr0' with parent '/' already present! [ 668.566742][T15574] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.573976][T15574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.581331][T15574] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.588476][T15574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.682630][T15574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 668.693294][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.701418][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.710063][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.718639][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 668.790934][T15574] 8021q: adding VLAN 0 to HW filter on device team0 [ 668.802720][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 668.811292][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.818392][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.897971][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 668.906903][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.913953][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.932195][T15574] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 668.943160][T15574] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 668.958147][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 668.966825][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 668.975783][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 668.983985][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 668.993116][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 669.000881][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 669.079087][T15574] 8021q: adding VLAN 0 to HW filter on device batadv0 23:13:10 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000180)={0x5, 0x70, 0x9, 0xcc2, 0x1, 0xfffb, 0x0, 0x80000000, 0x80004, 0x23c9588796647bb6, 0xffffffffffffff80, 0x14, 0xfff, 0x8, 0x8, 0x1, 0x5, 0x8, 0x7f, 0x4, 0x4ca67b4d, 0x81, 0x1, 0x6fef, 0x7, 0x10001, 0xffffffff, 0x0, 0xffffffff, 0x7, 0x7eb, 0x8, 0x100, 0xc0d1, 0x101, 0x2, 0x0, 0x9, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x2, 0x8001, 0xffffffff, 0x7, 0x3, 0x7fff, 0x80000001}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:10 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v./amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:10 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:10 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:10 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:10 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:11 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:11 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:11 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:11 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:11 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v//amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:11 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:11 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(r0, 0x0, 0xfffffffffffffffd, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:11 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:11 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:11 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:11 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:11 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v0/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:11 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:11 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 669.915751][ T8073] device bridge_slave_1 left promiscuous mode [ 669.936164][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:13:11 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:11 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vL/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:11 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 669.995459][ T8073] device bridge_slave_0 left promiscuous mode [ 670.004250][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:13:11 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8000010000, 0x0) ioctl$KVM_NMI(r1, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) fallocate(r0, 0x25, 0x1, 0x3) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000000000000000000020000000400000400000060d100007f0000005800ff7261b000000000000000000000040000003c0300000500000000100000010000000100000001bf11fb90d121c110ead0596a060000"]) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) 23:13:11 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:11 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:11 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:11 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:12 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vX/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:12 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:12 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:12 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:12 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:12 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:12 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 672.324588][ T8073] device hsr_slave_0 left promiscuous mode [ 672.374501][ T8073] device hsr_slave_1 left promiscuous mode [ 672.443803][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 672.454511][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 672.464957][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 672.510346][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 672.605713][ T8073] bond0 (unregistering): Released all slaves [ 672.730422][T15688] IPVS: ftp: loaded support on port[0] = 21 [ 672.791046][T15688] chnl_net:caif_netlink_parms(): no params data found [ 672.815038][T15688] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.822277][T15688] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.830501][T15688] device bridge_slave_0 entered promiscuous mode [ 672.838538][T15688] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.845735][T15688] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.853421][T15688] device bridge_slave_1 entered promiscuous mode [ 672.872008][T15688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 672.941819][T15688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 672.962469][T15688] team0: Port device team_slave_0 added [ 672.969633][T15688] team0: Port device team_slave_1 added [ 673.036782][T15688] device hsr_slave_0 entered promiscuous mode [ 673.074493][T15688] device hsr_slave_1 entered promiscuous mode [ 673.154146][T15688] debugfs: Directory 'hsr0' with parent '/' already present! [ 673.179770][T15688] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.186890][T15688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.194266][T15688] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.201313][T15688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.263567][T15688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 673.281356][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 673.298065][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.311197][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.329341][T15688] 8021q: adding VLAN 0 to HW filter on device team0 [ 673.348627][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 673.365273][ T8050] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.372342][ T8050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.402203][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 673.415110][ T9261] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.422171][ T9261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.451428][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 673.462127][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 673.477010][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 673.493571][T15688] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 673.512700][T15688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 673.521231][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 673.536262][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 673.561323][T15688] 8021q: adding VLAN 0 to HW filter on device batadv0 23:13:15 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, 0x0) 23:13:15 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/v\\/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:15 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:15 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:15 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:15 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:15 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:15 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:15 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:15 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:15 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vc/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:15 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:16 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000001c0)='./file1\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffc9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) prctl$PR_SVE_SET_VL(0x32, 0x1d0c0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x21, 0x2) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x1, 0x103000) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000280)={0x5, 0x2}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:16 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:16 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:16 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:16 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vd/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:16 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:16 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:16 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:16 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:16 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vh/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:16 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:16 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000004c0)=0xe8) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x20000, &(0x7f0000000500)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_user='access=user'}, {@fscache='fscache'}, {@msize={'msize', 0x3d, 0x7}}], [{@permit_directio='permit_directio'}, {@smackfshat={'smackfshat', 0x3d, '/proc/sys/net/ipv4/vs/amemthresh\x00'}}, {@hash='hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/proc/sys/net/ipv4/vs/amemthresh\x00'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_gt={'fowner>', r0}}, {@smackfsdef={'smackfsdef', 0x3d, '/proc/sys/net/ipv4/vs/amemthresh\x00'}}, {@euid_lt={'euid<', r1}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@euid_gt={'euid>', r2}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0xf004, &(0x7f0000000040), 0x2, r3, 0x1}) setsockopt$inet_int(r3, 0x0, 0x26, &(0x7f0000000180)=0x7ff, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:16 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:16 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:16 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:16 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vi/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:16 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:16 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:16 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:16 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:16 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:16 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vl/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:16 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 676.139599][T15802] IPVS: ftp: loaded support on port[0] = 21 [ 676.446936][T15802] chnl_net:caif_netlink_parms(): no params data found [ 676.471559][T15802] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.480467][T15802] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.488192][T15802] device bridge_slave_0 entered promiscuous mode [ 676.615777][T15802] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.622835][T15802] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.630887][T15802] device bridge_slave_1 entered promiscuous mode [ 676.645369][T15802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 676.656534][T15802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 676.792619][T15802] team0: Port device team_slave_0 added [ 676.800207][T15802] team0: Port device team_slave_1 added [ 676.856877][T15802] device hsr_slave_0 entered promiscuous mode [ 676.924485][T15802] device hsr_slave_1 entered promiscuous mode [ 676.994278][T15802] debugfs: Directory 'hsr0' with parent '/' already present! [ 677.003142][ T8073] device bridge_slave_1 left promiscuous mode [ 677.009425][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.044978][ T8073] device bridge_slave_0 left promiscuous mode [ 677.051168][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.095462][ T8073] device bridge_slave_1 left promiscuous mode [ 677.101633][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.145455][ T8073] device bridge_slave_0 left promiscuous mode [ 677.152128][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.444592][ T8073] device hsr_slave_0 left promiscuous mode [ 680.494404][ T8073] device hsr_slave_1 left promiscuous mode [ 680.543811][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 680.554387][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 680.564722][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 680.617834][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 680.683510][ T8073] bond0 (unregistering): Released all slaves [ 680.844803][ T8073] device hsr_slave_0 left promiscuous mode [ 680.894521][ T8073] device hsr_slave_1 left promiscuous mode [ 680.971702][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 680.983927][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 680.995060][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 681.020970][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 681.113374][ T8073] bond0 (unregistering): Released all slaves [ 681.222295][T15802] bridge0: port 2(bridge_slave_1) entered blocking state [ 681.229435][T15802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 681.236812][T15802] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.243873][T15802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 681.252664][ T3503] bridge0: port 1(bridge_slave_0) entered disabled state [ 681.260493][ T3503] bridge0: port 2(bridge_slave_1) entered disabled state [ 681.298027][T15802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 681.310041][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 681.318494][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 681.333557][T15802] 8021q: adding VLAN 0 to HW filter on device team0 [ 681.343911][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 681.352977][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 681.361453][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.368553][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 681.386009][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 681.395028][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 681.403348][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 681.410536][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 681.418777][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 681.429601][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 681.438217][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 681.446716][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 681.455359][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 681.463750][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 681.575248][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 681.583135][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 681.596396][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 681.609091][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 681.619824][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 681.634714][T15802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 681.661716][T15802] 8021q: adding VLAN 0 to HW filter on device batadv0 23:13:23 executing program 1: mkdir(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ptmx\x00', 0x22000, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000ac0)={0x0, 0x2, 0x400, 0x9, 0x1000, 0x1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unshare(0x8000000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = fanotify_init(0x0, 0x0) fanotify_mark(r4, 0xd, 0x20, r3, 0x0) signalfd(r1, &(0x7f0000000a40)={0x2}, 0x8) fanotify_mark(r2, 0x9, 0x8000022, r1, 0x0) dup2(r2, r3) syz_mount_image$gfs2(&(0x7f0000000280)='gfs2\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0xa, &(0x7f00000008c0)=[{&(0x7f0000000300)="3af194475cad38c6c68ebf8b54bf8aa0303fd05ccdd741f41ffa4d29761ffc775dcaa7898ec1eaa90330b7e395bc02c8ac400788921d7dc43e09a839073990cc110cbf87cade", 0x46, 0x3}, {&(0x7f0000000380)="f8aa9238859a6d4419b87befc20187e34451cb059bbdedefd34b56c0bba3da899037305702e5031b8aa54f038995499088f0c4da8236e0", 0x37, 0x3ff}, {&(0x7f00000003c0)="4dfd016c1852f6f2a193c8a564faa5f61d66cf5b78d968444982b39de8a4d39b43e32efc24afdf174dddd6e6a78cfec4c9c2a34f356511063abc364ce65cb5", 0x3f, 0x310000000}, {&(0x7f0000000400)="45f2af66de89cb437565ba4da856d4a180f585219de98013ec793d8d700acbd2489184d70c37ce88f477343b7dfde60e8b60af68e8ed7650741cbfcb0b5db9978c618bb8ecc12780d1965bfd3c40f686953e658a36b49425e37f50de74c6f593d8b0895e2ea2cae53958e5320511f10c9f2aa5bff94919e6fa60add67f51826857dec77f9e2eadeaa1a5948763349e4af9b7d756f31d59e20a77fe575c1688edaab539cd13e4b96ae57f605da847a3ddced2777c2b71de7771525e2f0bd2", 0xbe, 0x4d}, {&(0x7f00000004c0)="239a498c0bcb6f7537149f9fb0d4de6c70fd95af4fb8b00b7feaed2eba796caddf4523f34e04eb5f2f2aa950adda1fdf0965d9f8b13a44bdc072247440d69aec1ec8f3", 0x43, 0x200}, {&(0x7f0000000540)="4d685dfac615fa6d6d5dd38df238154c64852dde97f5658438c4bdd046992778f95f0c5bf521abad5d03a0f07ef4a94ba132472fd1cb7e350d1dc7bc78a7a1e4c60bcb8e6ac82985ea88c589ec0f2de7f16d5f4a44fbbbf72187bbf96103a40390db49bce7c4f61daf3893248b5f00cd8e92948b5f21ecf4f5322d89482ee59d52d35eb94e1be176f1553a769369f40500cc121ad13fd51f88e51d0131f0db6d1c63cfe781172587e9efc5c5681cd77bb1846402aa897e12e6f9ea53077ece17a4206806d65b20e3f950e528f127d7a02794192f387698539d3e8cfb6240a69009430aa4de374708f7698e91af33b43f993d620fa4", 0xf5, 0x1}, {&(0x7f0000000640)="bc34dc5bad802497ed8be14658838a221bf8f3919a4485c3c9218ed4d5b1a75541", 0x21, 0x9}, {&(0x7f0000000680)="0d941915644f129ba62d40b477bd29cefe", 0x11, 0x401}, {&(0x7f00000006c0)="db050127e9975b76e179a3a9f585026b5607c34fd60f03d083772e415d660ae2954f84daed7337be3948672b528e42f3887c10c7aad2b05ef8329aac1ea1afeb0f68b67b08e5007ce0b70052ecc416aaba9d8a14fbdf8ae576deb3324bc00cd1cf7f3bb56138fd5090b3934edab1dae27a3a9bbf2eb520dafc588dfae1d26592c29774fb9d4bfd0a375491377b52aae5464eb6d2ce53a77befa8462eef2f21a9ff2e9445edfb39af74efb0b4c679a5177a74a4eefc74895d97a5b03f0d6c5f81ab316a0a1bda81f74117", 0xca, 0x7f}, {&(0x7f00000007c0)="09c347323618ec11c7f9c237ba98a36678b1f6c15fd1dd8c85bd263f2ebedb338daea8573088681a50af41c5507dee8e969d3234d83e084c0221fecf4b3f1bdc9b1307604fd9726333fb48149a61a36f20499d24fe3df1d401ce4f9e1f2efad4b2b985689c42720d25fb99276a6c81dc1d23a0f45b0c56363a9d9c955836b09bfdabdab07eb2edd5c70f656bb78e80a956a266a7b46a606678bb38d039b8c0ec9bffa633b847b13a4e483cb47fe50a15e57b157917f7ac90201e6c31656050290986fd6ce9ff2c87bfc1c3", 0xcb, 0xffffffff}], 0x8, &(0x7f00000009c0)={[{@upgrade='upgrade'}, {@quota_quantum={'quota_quantum', 0x3d, 0x200}}, {@quota='quota'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@appraise='appraise'}]}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80540, 0x0) ioctl$TCSETXF(r5, 0x5434, &(0x7f0000000080)={0x92, 0x6, [0xfffffffffffffff8, 0xff, 0xfd, 0x9, 0x6], 0x400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE(r5, 0x1260, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000240)={0x3, &(0x7f0000000180)=[{0xfffffffffffffffb, 0x8, 0x6, 0x7}, {0xaca8, 0x1000, 0x1ff, 0x9}, {0x10000, 0x6, 0x3f, 0x380000}]}, 0x10) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:23 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:23 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:23 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:23 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:23 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vo/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:23 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:23 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:23 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:23 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:23 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vp/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:23 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:24 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x1, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {&(0x7f0000000080)=""/50, 0x32, &(0x7f0000000240)=""/237, 0x3, 0x2}}, 0x68) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x7) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, 0x0) 23:13:24 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:24 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:24 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vt/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:24 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:24 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:24 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:24 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:24 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vu/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:24 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:24 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:24 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000180)={{0x2, 0x4e22, @loopback}, {0x6}, 0x10, {0x2, 0x4e23, @multicast1}, 'vxcan1\x00'}) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:24 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:24 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:24 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:24 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:24 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:24 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vx/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:24 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:24 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:24 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:24 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:25 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 684.390586][T15917] IPVS: ftp: loaded support on port[0] = 21 [ 684.578126][T15917] chnl_net:caif_netlink_parms(): no params data found [ 684.602748][T15917] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.609972][T15917] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.617876][T15917] device bridge_slave_0 entered promiscuous mode [ 684.626516][T15917] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.633614][T15917] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.641884][T15917] device bridge_slave_1 entered promiscuous mode [ 684.714603][T15917] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 684.726536][T15917] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 684.742559][T15917] team0: Port device team_slave_0 added [ 684.750029][T15917] team0: Port device team_slave_1 added [ 684.866852][T15917] device hsr_slave_0 entered promiscuous mode [ 684.904787][T15917] device hsr_slave_1 entered promiscuous mode [ 684.954340][T15917] debugfs: Directory 'hsr0' with parent '/' already present! [ 685.027367][T15917] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.034583][T15917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.041855][T15917] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.048952][T15917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.142782][T15917] 8021q: adding VLAN 0 to HW filter on device bond0 [ 685.155433][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 685.163325][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.171482][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.180852][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 685.193394][T15917] 8021q: adding VLAN 0 to HW filter on device team0 [ 685.276019][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 685.284586][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.291644][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.299884][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 685.309195][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.316593][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.324675][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 685.333133][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 685.342525][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 685.417460][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 685.429528][T15917] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 685.441244][T15917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 685.451233][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 685.460496][ T8073] device bridge_slave_1 left promiscuous mode [ 685.468351][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.525573][ T8073] device bridge_slave_0 left promiscuous mode [ 685.531952][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.204942][ T8073] device hsr_slave_0 left promiscuous mode [ 687.244442][ T8073] device hsr_slave_1 left promiscuous mode [ 687.293404][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 687.305108][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 687.316617][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 687.348422][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 687.412109][ T8073] bond0 (unregistering): Released all slaves [ 687.521537][T15917] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 687.662489][T15925] QAT: Invalid ioctl 23:13:29 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)={{0x8e7c, 0x7f}, 0x668f062dbb1fb6a6, 0xffffffff, 0x9, {0x594d, 0x6}, 0x52688ee7, 0xf29}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:29 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:29 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vz/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:29 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:29 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:29 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:29 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:29 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:29 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:29 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:29 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs\\amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:29 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:30 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:30 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/.memthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:30 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs//memthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:30 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x20000) ioctl$KVM_NMI(r0, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:30 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/\\memthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:30 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/a\\emthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 690.311003][T16035] IPVS: ftp: loaded support on port[0] = 21 [ 690.426309][T16035] chnl_net:caif_netlink_parms(): no params data found [ 690.511327][T16035] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.518809][T16035] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.526793][T16035] device bridge_slave_0 entered promiscuous mode [ 690.535108][T16035] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.542236][T16035] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.550700][T16035] device bridge_slave_1 entered promiscuous mode [ 690.625430][T16035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 690.636620][T16035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 690.653113][T16035] team0: Port device team_slave_0 added [ 690.660928][T16035] team0: Port device team_slave_1 added [ 690.736708][T16035] device hsr_slave_0 entered promiscuous mode [ 690.784660][T16035] device hsr_slave_1 entered promiscuous mode [ 690.854237][T16035] debugfs: Directory 'hsr0' with parent '/' already present! [ 690.927333][T16035] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.934642][T16035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 690.942209][T16035] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.949502][T16035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.042315][T16035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 691.056270][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 691.065769][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.073688][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.083252][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 691.157372][T16035] 8021q: adding VLAN 0 to HW filter on device team0 [ 691.170649][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 691.179652][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.188143][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.266300][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 691.275594][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.282662][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 691.291064][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 691.366541][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 691.375123][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 691.383677][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 691.397020][ T8073] device bridge_slave_1 left promiscuous mode [ 691.403227][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.445490][ T8073] device bridge_slave_0 left promiscuous mode [ 691.451714][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.124948][ T8073] device hsr_slave_0 left promiscuous mode [ 693.194351][ T8073] device hsr_slave_1 left promiscuous mode [ 693.253865][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 693.266836][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 693.277281][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 693.317818][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 693.415395][ T8073] bond0 (unregistering): Released all slaves [ 693.509993][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 693.523409][T16035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 693.540386][T16035] 8021q: adding VLAN 0 to HW filter on device batadv0 23:13:35 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:35 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:35 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:35 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/am%mthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:35 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') fadvise64(r0, 0x0, 0x1000, 0x5) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:35 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:35 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:35 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:35 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:35 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:35 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/am\\mthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:35 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:35 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:35 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:35 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:35 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/ame\\thresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:36 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:36 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:36 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:36 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:36 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:36 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amem\\hresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:36 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:36 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:36 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:36 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:36 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemt/resh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:36 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:36 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/113) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:36 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:36 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:36 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:36 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemt\\resh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:36 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:36 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:36 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:36 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:36 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemth\\esh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:36 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:36 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 696.177611][T16170] IPVS: ftp: loaded support on port[0] = 21 [ 696.348857][T16170] chnl_net:caif_netlink_parms(): no params data found [ 696.375054][T16170] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.382277][T16170] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.390074][T16170] device bridge_slave_0 entered promiscuous mode [ 696.398770][T16170] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.405936][T16170] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.413597][T16170] device bridge_slave_1 entered promiscuous mode [ 696.431392][T16170] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 696.501924][T16170] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 696.520762][T16170] team0: Port device team_slave_0 added [ 696.527980][T16170] team0: Port device team_slave_1 added [ 696.656838][T16170] device hsr_slave_0 entered promiscuous mode [ 696.697724][T16170] device hsr_slave_1 entered promiscuous mode [ 696.734275][T16170] debugfs: Directory 'hsr0' with parent '/' already present! [ 696.807708][T16170] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.814818][T16170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.822089][T16170] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.829181][T16170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.927394][T16170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 696.940286][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 696.948915][ T3503] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.957214][ T3503] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.965624][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 697.038303][T16170] 8021q: adding VLAN 0 to HW filter on device team0 [ 697.049749][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 697.058338][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.065440][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 697.138797][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 697.147669][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.154890][ T8050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 697.241658][T16170] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 697.252451][T16170] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 697.263947][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 697.272671][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 697.281170][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 697.289682][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 697.298198][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 697.306789][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 697.315325][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 697.323572][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 697.331993][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 697.339973][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 697.421092][T16170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 697.445181][ T8073] device bridge_slave_1 left promiscuous mode [ 697.451610][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.485250][ T8073] device bridge_slave_0 left promiscuous mode [ 697.491449][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.124632][ T8073] device hsr_slave_0 left promiscuous mode [ 699.174385][ T8073] device hsr_slave_1 left promiscuous mode [ 699.230932][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 699.243500][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 699.254558][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 699.288102][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 699.382035][ T8073] bond0 (unregistering): Released all slaves 23:13:41 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:41 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:41 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:41 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:41 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x14000) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000180)={0x7f, 0x7, 0x861a}) 23:13:41 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthr%sh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:41 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:41 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:41 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:41 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:41 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthr\\sh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:41 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:41 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:41 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:41 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:41 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre#h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:42 executing program 1: mkdir(0x0, 0x4000240) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x100000, &(0x7f0000000380)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@rq={'rq', 0x3d, 0x5}}, {@sq={'sq', 0x3d, 0x81}}, {@common=@dfltgid={'dfltgid', 0x3d, r0}}, {@rq={'rq', 0x3d, 0x101}}, {@common=@noextend='noextend'}], [{@dont_measure='dont_measure'}, {@subj_user={'subj_user', 0x3d, '/proc/sys/net/ipv4/vs/amemthresh\x00'}}, {@smackfstransmute={'smackfstransmute'}}, {@fowner_gt={'fowner>', r1}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_role={'subj_role', 0x3d, '/proc/sys/net/ipv4/vs/amemthresh\x00'}}]}}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r3 = dup(r2) ioctl$SIOCRSSCAUSE(r3, 0x89e1, &(0x7f0000000040)=0x2) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:42 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:42 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre%h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:42 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:42 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre*h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:42 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(r0, 0x0, 0x20000000000, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:42 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre+h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:42 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:42 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:42 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:42 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:42 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 702.157149][T16298] IPVS: ftp: loaded support on port[0] = 21 [ 702.217008][T16298] chnl_net:caif_netlink_parms(): no params data found [ 702.241992][T16298] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.249302][T16298] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.257013][T16298] device bridge_slave_0 entered promiscuous mode [ 702.385610][T16298] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.392733][T16298] bridge0: port 2(bridge_slave_1) entered disabled state [ 702.400744][T16298] device bridge_slave_1 entered promiscuous mode [ 702.417937][T16298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 702.429118][T16298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 702.511300][T16298] team0: Port device team_slave_0 added [ 702.524881][T16298] team0: Port device team_slave_1 added [ 702.646446][T16298] device hsr_slave_0 entered promiscuous mode [ 702.694696][T16298] device hsr_slave_1 entered promiscuous mode [ 702.734218][T16298] debugfs: Directory 'hsr0' with parent '/' already present! [ 702.807044][T16298] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.814155][T16298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 702.821596][T16298] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.828746][T16298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.922362][T16298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 702.933947][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 702.942233][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.952357][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 702.961589][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 703.032745][T16298] 8021q: adding VLAN 0 to HW filter on device team0 [ 703.043636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 703.052604][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.059731][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 703.070500][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 703.079750][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.086895][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 703.165096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 703.177560][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 703.185625][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 703.199956][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 703.274252][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 703.282622][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 703.295636][T16298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 703.375193][T16298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 703.409778][ T8073] device bridge_slave_1 left promiscuous mode [ 703.417050][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.465495][ T8073] device bridge_slave_0 left promiscuous mode [ 703.471758][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.124961][ T8073] device hsr_slave_0 left promiscuous mode [ 705.194224][ T8073] device hsr_slave_1 left promiscuous mode [ 705.273323][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 705.284611][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 705.295744][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 705.338176][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 705.423043][ T8073] bond0 (unregistering): Released all slaves 23:13:47 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:47 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre-h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:47 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:47 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:47 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:47 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:47 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:47 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:47 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre.h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:47 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:47 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:47 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:48 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x100000000000000, 0x78, 0x3, 0x19}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/G\xb6\x1e\x81\x80\x82i\x93hresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:48 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:48 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:48 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:48 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre/h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:48 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:48 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:48 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:48 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre0h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:48 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:48 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x9, 0x6, 0x8, 0x2, 0x0, 0x10000, 0x8000, 0x1, 0x7, 0x2000000040000000, 0x7, 0x7, 0x2000000020, 0x6, 0x2, 0x9, 0x3f, 0x1000, 0xa5b, 0x9f, 0x8, 0x80000000, 0x6, 0x4, 0xffffffffffffbfb1, 0xffffffffffff0001, 0x8, 0x8, 0xfffffffffffffffe, 0x7, 0x6, 0x10000, 0x0, 0xa48c, 0x68f7, 0x80000000, 0x0, 0xb5c, 0x3, @perf_config_ext={0xffffffff00000001, 0x100000001}, 0x8, 0x6, 0x9, 0x0, 0x12e8, 0x3ff, 0xfffffffffffffffd}, r2, 0xc, r0, 0xb) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:48 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:48 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:48 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthreLh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:48 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:48 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:48 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthreXh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:48 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:48 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:48 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 708.102237][T16415] IPVS: ftp: loaded support on port[0] = 21 [ 708.159768][T16415] chnl_net:caif_netlink_parms(): no params data found [ 708.183322][T16415] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.190993][T16415] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.198815][T16415] device bridge_slave_0 entered promiscuous mode [ 708.207045][T16415] bridge0: port 2(bridge_slave_1) entered blocking state [ 708.214232][T16415] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.222007][T16415] device bridge_slave_1 entered promiscuous mode [ 708.351923][T16415] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 708.363149][T16415] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 708.445923][T16415] team0: Port device team_slave_0 added [ 708.452661][T16415] team0: Port device team_slave_1 added [ 708.507228][T16415] device hsr_slave_0 entered promiscuous mode [ 708.545519][T16415] device hsr_slave_1 entered promiscuous mode [ 708.584328][T16415] debugfs: Directory 'hsr0' with parent '/' already present! [ 708.656573][T16415] bridge0: port 2(bridge_slave_1) entered blocking state [ 708.663657][T16415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 708.671060][T16415] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.678184][T16415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 708.771920][T16415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 708.785316][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 708.793400][ T3012] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.801414][ T3012] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.810060][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 708.881543][T16415] 8021q: adding VLAN 0 to HW filter on device team0 [ 708.892581][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 708.901684][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 708.908838][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 708.927178][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 708.936465][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 708.943515][ T8050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 708.951684][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 709.027378][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 709.035675][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 709.043976][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 709.056420][T16415] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 709.068116][T16415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 709.076283][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 709.155676][T16415] 8021q: adding VLAN 0 to HW filter on device batadv0 23:13:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:51 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthre\\h\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:51 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200080, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f0000000080)}, 0x10) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000240)=""/172) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 709.425089][ T8073] device bridge_slave_1 left promiscuous mode [ 709.431470][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:13:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:51 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthrech\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 709.539198][ T8073] device bridge_slave_0 left promiscuous mode [ 709.554154][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:13:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthredh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:51 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 711.584843][ T8073] device hsr_slave_0 left promiscuous mode [ 711.634326][ T8073] device hsr_slave_1 left promiscuous mode [ 711.700839][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 711.713460][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 711.724831][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 711.797946][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 711.881569][ T8073] bond0 (unregistering): Released all slaves 23:13:53 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x103) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x801, 0x0) llistxattr(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)=""/4096, 0x1000) accept(r0, &(0x7f00000002c0)=@alg, &(0x7f00000001c0)=0x80) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00') perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x1, 0xfffffffffffffff9, 0x2bd3640f, 0xfffffffffffffffb, 0x0, 0x5, 0x42100, 0x0, 0xf9, 0x9, 0x8000, 0xdd, 0x6, 0x4, 0x10001, 0x6, 0xffff, 0x2, 0x7fff, 0x100, 0x1, 0x0, 0x80000000, 0x7, 0xffffffffffffff81, 0x8, 0x169, 0xfffffffffffffffe, 0x9, 0xc00000000000, 0x9, 0x1, 0x1, 0x1, 0x3f, 0xa0000, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000100)}, 0x400, 0x2, 0x4f4, 0xc, 0xffff, 0x5, 0x8}, r1, 0xffffffffffffffff, r1, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001380)='/dev/snapshot\x00', 0x220040, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000013c0), &(0x7f0000001400)=0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:53 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:53 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:53 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:53 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthrehh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:53 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:53 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:53 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:53 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:53 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:54 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthreih\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:54 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000180)={'nat\x00', 0x4e, "40386a6422ea4d4e30413c2a6101a62f052620d35212d7db4dbe29e7b867eb7c078b57318c5158ae5ae7025191e8d6288467f73c3414e1c166020abe85a44850900d597e5412dd200f65124d56ff"}, &(0x7f0000000240)=0x72) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) write$P9_RLERROR(r1, &(0x7f0000000040)={0x9, 0x7, 0x1}, 0x9) 23:13:54 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:54 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthrelh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:54 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:54 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:54 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:54 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:54 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthreoh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:54 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:54 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 713.918478][T16544] IPVS: ftp: loaded support on port[0] = 21 [ 713.985636][T16544] chnl_net:caif_netlink_parms(): no params data found [ 714.011499][T16544] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.018962][T16544] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.027213][T16544] device bridge_slave_0 entered promiscuous mode [ 714.038515][T16544] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.049553][T16544] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.057405][T16544] device bridge_slave_1 entered promiscuous mode [ 714.074848][T16544] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 714.086055][T16544] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 714.220957][T16544] team0: Port device team_slave_0 added [ 714.228359][T16544] team0: Port device team_slave_1 added [ 714.265961][T16544] device hsr_slave_0 entered promiscuous mode [ 714.324444][T16544] device hsr_slave_1 entered promiscuous mode [ 714.404210][T16544] debugfs: Directory 'hsr0' with parent '/' already present! [ 714.481404][T16544] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.488522][T16544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 714.495894][T16544] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.502952][T16544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 714.597068][T16544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 714.608762][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 714.617495][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.625279][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.633310][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 714.709798][T16544] 8021q: adding VLAN 0 to HW filter on device team0 [ 714.719738][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 714.728289][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.735380][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 714.755314][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 714.763815][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.770951][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 714.779365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 714.788020][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 714.865776][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 714.874324][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 714.882494][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 714.952295][T16544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 715.073465][T16544] 8021q: adding VLAN 0 to HW filter on device batadv0 23:13:56 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000240)=""/4096) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x0, 0x0, 0x52f8cc04}}, 0x28) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:56 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:56 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:56 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:56 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:56 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthreph\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:57 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:57 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthreth\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:57 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:57 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:57 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:57 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 715.769078][ T8073] device bridge_slave_1 left promiscuous mode [ 715.775997][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.835199][ T8073] device bridge_slave_0 left promiscuous mode [ 715.841380][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.504604][ T8073] device hsr_slave_0 left promiscuous mode [ 717.574293][ T8073] device hsr_slave_1 left promiscuous mode [ 717.653029][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 717.665454][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 717.676341][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 717.730121][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 717.817536][ T8073] bond0 (unregistering): Released all slaves 23:13:59 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x400200) ioctl$KVM_NMI(r0, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:59 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthreuh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:59 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:59 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:59 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:59 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:59 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:59 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:59 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:13:59 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:59 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:13:59 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x100000a, 0x80010, r0, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:13:59 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthrexh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:13:59 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:13:59 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:13:59 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:00 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:00 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthrezh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:00 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:00 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:00 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:00 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:00 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 719.582129][T16656] IPVS: ftp: loaded support on port[0] = 21 [ 719.676589][T16656] chnl_net:caif_netlink_parms(): no params data found [ 719.702533][T16656] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.709940][T16656] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.717619][T16656] device bridge_slave_0 entered promiscuous mode [ 719.726042][T16656] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.733150][T16656] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.741060][T16656] device bridge_slave_1 entered promiscuous mode [ 719.757009][T16656] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 719.771927][T16656] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 719.791330][T16656] team0: Port device team_slave_0 added [ 719.798557][T16656] team0: Port device team_slave_1 added [ 719.856845][T16656] device hsr_slave_0 entered promiscuous mode [ 719.904585][T16656] device hsr_slave_1 entered promiscuous mode [ 719.964455][T16656] debugfs: Directory 'hsr0' with parent '/' already present! [ 720.093375][T16656] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.100505][T16656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 720.107866][T16656] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.114936][T16656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 720.210268][T16656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 720.222853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 720.231594][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.239713][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.249284][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 720.322731][T16656] 8021q: adding VLAN 0 to HW filter on device team0 [ 720.336681][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 720.345218][ T8050] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.352274][ T8050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 720.426589][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 720.435616][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.442671][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 720.455490][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 720.467011][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 720.475747][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 720.549744][T16656] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 720.560562][T16656] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 720.573468][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 720.582048][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 720.591610][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 720.669329][T16656] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:02 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthres/\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:02 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:02 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:02 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:02 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000040)) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) bind$unix(r0, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x9, &(0x7f0000000280)=ANY=[@ANYBLOB="18007dc1000002000000000000001202000015b8ffffffffffffa4a60800000000002f8af8ff180000001813", @ANYRES32=r0, @ANYBLOB="000000000000000091f10000020000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x9, 0x66, &(0x7f0000000300)=""/102, 0x41f00, 0x1, [], 0x0, 0x11, r0, 0x8, &(0x7f0000000380)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x9, 0x72348890, 0x3f}, 0x10}, 0x70) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:02 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:02 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:02 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:02 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:02 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:02 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthres\\\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:02 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:02 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:02 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:02 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:02 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:03 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000080), &(0x7f0000000180)=0x4) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) ioctl$KIOCSOUND(r0, 0x4b2f, 0x6) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:03 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x02', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:03 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:03 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:03 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:03 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:03 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 721.695273][ T8073] device bridge_slave_1 left promiscuous mode [ 721.701528][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:14:03 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:03 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:03 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:03 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x03', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 721.799424][ T8073] device bridge_slave_0 left promiscuous mode [ 721.842473][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:14:03 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000080)={0xffffffffffff563c, "6c71e4f32844c28b9a942ed2124e57fce974f09c4db615a52996e2354f287397", 0x3, 0x1}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:03 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:03 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:03 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:03 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:03 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x04', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:03 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:03 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:03 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:03 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:03 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:03 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 724.064759][ T8073] device hsr_slave_0 left promiscuous mode [ 724.104266][ T8073] device hsr_slave_1 left promiscuous mode [ 724.152952][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 724.166673][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 724.177424][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 724.247865][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 724.343994][ T8073] bond0 (unregistering): Released all slaves [ 724.479702][T16781] IPVS: ftp: loaded support on port[0] = 21 [ 724.552210][T16781] chnl_net:caif_netlink_parms(): no params data found [ 724.581711][T16781] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.589195][T16781] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.597078][T16781] device bridge_slave_0 entered promiscuous mode [ 724.608699][T16781] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.615944][T16781] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.623711][T16781] device bridge_slave_1 entered promiscuous mode [ 724.642575][T16781] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 724.653831][T16781] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 724.674495][T16781] team0: Port device team_slave_0 added [ 724.682009][T16781] team0: Port device team_slave_1 added [ 724.736964][T16781] device hsr_slave_0 entered promiscuous mode [ 724.794660][T16781] device hsr_slave_1 entered promiscuous mode [ 724.844315][T16781] debugfs: Directory 'hsr0' with parent '/' already present! [ 724.916312][T16781] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.923410][T16781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.930820][T16781] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.937929][T16781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.001405][T16781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 725.022732][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 725.032271][ T3503] bridge0: port 1(bridge_slave_0) entered disabled state [ 725.041057][ T3503] bridge0: port 2(bridge_slave_1) entered disabled state [ 725.061889][T16781] 8021q: adding VLAN 0 to HW filter on device team0 [ 725.085117][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 725.093628][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.100732][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.125255][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 725.133732][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 725.140860][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 725.162737][T16781] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 725.173577][T16781] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 725.187636][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 725.197394][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 725.212168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 725.222793][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 725.245217][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 725.252996][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 725.272374][T16781] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:07 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) accept(r0, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000240)=0x80) mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) msgget$private(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_vs_stats\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7}, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) truncate(&(0x7f0000000080)='./file1\x00', 0x1152) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x0) setpriority(0x0, 0x0, 0xffff) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000004c0)={0x1a, 0x75, 0x2, {0xf, "6d1dc6d9b676b6b6a75e5ac8218286"}}, 0x1a) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000880)={0x0, 0x10000, 0x3, 'queue1\x00', 0x200}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[0x0, &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000040)) 23:14:07 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x05', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:07 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:07 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:07 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:07 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:07 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:07 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:07 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:07 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:07 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x06', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:07 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:07 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x280, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)=0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:07 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:07 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:07 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:07 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:07 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\a', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:07 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:07 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\b', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:07 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:07 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:07 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:08 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:08 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\t', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:08 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\n', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:08 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:08 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x80000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000180)={0x8, [0x40, 0x7ff, 0x4893, 0xffffffffffff669b, 0x3f, 0x79, 0xcf8, 0x4]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\v', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:08 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:08 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:08 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:08 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:08 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\f', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:09 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 728.481122][T16943] IPVS: ftp: loaded support on port[0] = 21 [ 728.772569][T16943] chnl_net:caif_netlink_parms(): no params data found [ 728.917390][T16943] bridge0: port 1(bridge_slave_0) entered blocking state [ 728.924715][T16943] bridge0: port 1(bridge_slave_0) entered disabled state [ 728.932354][T16943] device bridge_slave_0 entered promiscuous mode [ 729.059484][T16943] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.066928][T16943] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.074728][T16943] device bridge_slave_1 entered promiscuous mode [ 729.092298][T16943] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 729.103306][T16943] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 729.244884][T16943] team0: Port device team_slave_0 added [ 729.251674][T16943] team0: Port device team_slave_1 added [ 729.326929][T16943] device hsr_slave_0 entered promiscuous mode [ 729.394475][T16943] device hsr_slave_1 entered promiscuous mode [ 729.444288][T16943] debugfs: Directory 'hsr0' with parent '/' already present! [ 729.576456][T16943] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.583611][T16943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.591026][T16943] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.598154][T16943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.631842][T16943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 729.768258][T16943] 8021q: adding VLAN 0 to HW filter on device team0 [ 729.775640][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.784078][ T9261] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.792316][ T9261] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.801504][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 729.815846][ T8073] device bridge_slave_1 left promiscuous mode [ 729.822067][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.855089][ T8073] device bridge_slave_0 left promiscuous mode [ 729.861364][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.907017][ T8073] device bridge_slave_1 left promiscuous mode [ 729.913207][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.955109][ T8073] device bridge_slave_0 left promiscuous mode [ 729.961294][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.276646][ T8073] device hsr_slave_0 left promiscuous mode [ 733.324306][ T8073] device hsr_slave_1 left promiscuous mode [ 733.400939][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 733.412735][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 733.423605][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 733.481380][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 733.573761][ T8073] bond0 (unregistering): Released all slaves [ 733.745179][ T8073] device hsr_slave_0 left promiscuous mode [ 733.785234][ T8073] device hsr_slave_1 left promiscuous mode [ 733.833418][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 733.845894][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 733.856927][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 733.909615][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 733.991669][ T8073] bond0 (unregistering): Released all slaves [ 734.136759][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 734.146378][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 734.154766][ T3012] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.161786][ T3012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.170828][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 734.179879][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 734.188637][ T3012] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.195718][ T3012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.216205][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 734.224918][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 734.239798][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 734.248607][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 734.257066][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 734.265639][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 734.274688][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 734.284342][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 734.292534][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 734.309402][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 734.318729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 734.330633][T16943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 734.352185][T16943] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:16 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x7, 0x70, 0x0, 0x0, 0x0, 0x3a3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd7e, 0x0, 0x4, 0x0, @perf_config_ext={0x6, 0x5}, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x6}, 0x0, 0x6, 0xffffffffffffff9c, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:16 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:16 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:16 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:16 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:16 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\r', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:16 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:16 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:16 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:16 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:16 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x0e', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:16 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:17 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 23:14:17 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:17 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:17 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:17 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x10', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:17 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:17 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:17 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:17 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:17 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x11', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:17 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:17 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:17 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:17 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x492000, 0x0) accept4$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, &(0x7f00000001c0)=0x1c, 0x800) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x25) 23:14:17 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:17 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:17 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:17 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:17 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x12', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:17 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:17 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:17 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:17 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:17 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh%', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:17 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 737.089729][T17064] IPVS: ftp: loaded support on port[0] = 21 [ 737.151376][T17064] chnl_net:caif_netlink_parms(): no params data found [ 737.293793][T17064] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.301120][T17064] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.308835][T17064] device bridge_slave_0 entered promiscuous mode [ 737.376967][T17064] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.385334][T17064] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.392937][T17064] device bridge_slave_1 entered promiscuous mode [ 737.410490][T17064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 737.480921][T17064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 737.500131][T17064] team0: Port device team_slave_0 added [ 737.507097][T17064] team0: Port device team_slave_1 added [ 737.556945][T17064] device hsr_slave_0 entered promiscuous mode [ 737.594607][T17064] device hsr_slave_1 entered promiscuous mode [ 737.664206][T17064] debugfs: Directory 'hsr0' with parent '/' already present! [ 737.737108][T17064] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.744346][T17064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 737.751609][T17064] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.758698][T17064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 737.851014][T17064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 737.864348][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 737.872182][ T3503] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.879765][ T3503] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.888532][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 737.960857][T17064] 8021q: adding VLAN 0 to HW filter on device team0 [ 737.970776][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 737.979656][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.986760][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.006133][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 738.014585][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.021607][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.031625][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 738.040792][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 738.111063][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 738.127014][T17064] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 738.137535][T17064] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 738.150071][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 738.159074][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 738.167940][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 738.251126][T17064] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:20 executing program 1: uselib(&(0x7f0000000180)='./file0\x00') mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x3, 0xffffffffffffff81, 0xfffffffffffffffe}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x81}, 0x8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x802, 0x0) 23:14:20 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:20 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:20 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:20 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:20 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\\', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 738.375038][ T8073] device bridge_slave_1 left promiscuous mode [ 738.381265][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.405774][ T8073] device bridge_slave_0 left promiscuous mode [ 738.412089][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:14:20 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:20 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:20 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:20 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:20 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\xe0', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:20 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 740.394786][ T8073] device hsr_slave_0 left promiscuous mode [ 740.444418][ T8073] device hsr_slave_1 left promiscuous mode [ 740.513173][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 740.525611][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 740.536336][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 740.619564][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 740.705115][ T8073] bond0 (unregistering): Released all slaves 23:14:22 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xc159, 0x40000) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000080)={0x101, 0x41}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) io_setup(0x7ff, &(0x7f0000000180)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:22 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:22 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:22 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:22 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:22 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:22 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:22 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:22 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:22 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:23 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x18, 0xffff, 0x40, 0x7, 0x80, 0xffffffffffffff9c, 0x7, [], 0x0, 0xffffffffffffff9c, 0x2}, 0x3c) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) syz_open_dev$vivid(&(0x7f0000000240)='/dev/video#\x00', 0x0, 0x2) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x5, 0x10100) open(&(0x7f00000002c0)='./file0\x00', 0x1c000, 0x107) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x8080, 0x0) socket$unix(0x1, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000380)='./file0/file0\x00', 0x110) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:23 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:23 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:23 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:23 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:23 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:23 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:23 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:23 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:23 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:23 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:23 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 742.666017][T17181] IPVS: ftp: loaded support on port[0] = 21 [ 742.730006][T17181] chnl_net:caif_netlink_parms(): no params data found [ 742.785558][T17181] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.792730][T17181] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.800814][T17181] device bridge_slave_0 entered promiscuous mode [ 742.808468][T17181] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.815646][T17181] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.823308][T17181] device bridge_slave_1 entered promiscuous mode [ 742.839763][T17181] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 742.850451][T17181] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 742.868420][T17181] team0: Port device team_slave_0 added [ 742.875485][T17181] team0: Port device team_slave_1 added [ 742.936998][T17181] device hsr_slave_0 entered promiscuous mode [ 742.974588][T17181] device hsr_slave_1 entered promiscuous mode [ 743.034299][T17181] debugfs: Directory 'hsr0' with parent '/' already present! [ 743.163224][T17181] bridge0: port 2(bridge_slave_1) entered blocking state [ 743.170332][T17181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 743.177693][T17181] bridge0: port 1(bridge_slave_0) entered blocking state [ 743.184760][T17181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 743.278649][T17181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 743.289200][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 743.297390][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 743.305430][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 743.313254][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 743.385394][T17181] 8021q: adding VLAN 0 to HW filter on device team0 [ 743.395980][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 743.404923][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 743.411989][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 743.493420][T17181] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 743.504446][T17181] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 743.516761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 743.525434][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 743.532471][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 743.541490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 743.550087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 743.558569][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 743.567102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 743.575547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 743.583132][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 743.661977][T17181] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:25 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:25 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:25 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:25 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:25 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:25 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:25 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:25 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:25 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:25 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:25 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:25 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:26 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:26 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xe509, 0x40001) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0xffff) mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:26 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:26 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:26 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:26 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:26 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:26 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) [ 744.555571][ T8073] device bridge_slave_1 left promiscuous mode [ 744.564988][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:14:26 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:26 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:26 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 744.655188][ T8073] device bridge_slave_0 left promiscuous mode [ 744.661457][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:14:26 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000240)) r1 = getpgrp(0xffffffffffffffff) fcntl$setown(r0, 0x8, r1) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:26 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:26 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:26 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:26 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:26 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:26 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:26 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:26 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:26 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:26 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:26 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 746.974701][ T8073] device hsr_slave_0 left promiscuous mode [ 747.014279][ T8073] device hsr_slave_1 left promiscuous mode [ 747.063115][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 747.075237][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 747.086244][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 747.147910][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 747.242982][ T8073] bond0 (unregistering): Released all slaves [ 747.381953][T17297] IPVS: ftp: loaded support on port[0] = 21 [ 747.451127][T17297] chnl_net:caif_netlink_parms(): no params data found [ 747.520619][T17297] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.527897][T17297] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.542853][T17297] device bridge_slave_0 entered promiscuous mode [ 747.551671][T17297] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.565415][T17297] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.573389][T17297] device bridge_slave_1 entered promiscuous mode [ 747.609381][T17297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 747.627321][T17297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 747.658765][T17297] team0: Port device team_slave_0 added [ 747.668951][T17297] team0: Port device team_slave_1 added [ 747.749387][T17297] device hsr_slave_0 entered promiscuous mode [ 747.814505][T17297] device hsr_slave_1 entered promiscuous mode [ 747.864175][T17297] debugfs: Directory 'hsr0' with parent '/' already present! [ 747.889014][T17297] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.896150][T17297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 747.903572][T17297] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.910690][T17297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 747.987494][T17297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 748.008485][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 748.022381][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.031863][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.052008][T17297] 8021q: adding VLAN 0 to HW filter on device team0 [ 748.063529][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 748.072652][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.079769][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 748.098123][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 748.107427][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.114543][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 748.152091][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 748.161136][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 748.175932][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 748.188887][T17297] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 748.200502][T17297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 748.209486][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 748.217654][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 748.241026][T17297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 748.397951][T17304] QAT: Invalid ioctl 23:14:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:30 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:30 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xe21c, 0x2000) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1000, 0x40) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x2, 0x2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x109100, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x6, 0xa80b81634b074654) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x40000, 0x0) ioctl$KVM_NMI(r0, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:30 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:30 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:30 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000040)={0x6, "6089aa349c6b2eb806d27200839d5007b659a966aa759489663628836de29ca1", 0x3, 0x6, 0x5f}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:30 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:30 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:30 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:30 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:31 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40c200, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x92200, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0xa43, 0x10280) ioctl$KVM_NMI(r1, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:31 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:31 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:31 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:31 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:31 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:31 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:31 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:31 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\xff', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:31 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 751.201668][T17425] IPVS: ftp: loaded support on port[0] = 21 [ 751.383525][T17425] chnl_net:caif_netlink_parms(): no params data found [ 751.529673][T17425] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.537094][T17425] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.545424][T17425] device bridge_slave_0 entered promiscuous mode [ 751.553051][T17425] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.560274][T17425] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.567994][T17425] device bridge_slave_1 entered promiscuous mode [ 751.575674][ T8073] device bridge_slave_1 left promiscuous mode [ 751.581957][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.625605][ T8073] device bridge_slave_0 left promiscuous mode [ 751.631885][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.695568][ T8073] device bridge_slave_1 left promiscuous mode [ 751.701749][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.764899][ T8073] device bridge_slave_0 left promiscuous mode [ 751.771112][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.084667][ T8073] device hsr_slave_0 left promiscuous mode [ 755.154439][ T8073] device hsr_slave_1 left promiscuous mode [ 755.223091][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 755.235318][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 755.246849][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 755.291313][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 755.381408][ T8073] bond0 (unregistering): Released all slaves [ 755.535116][ T8073] device hsr_slave_0 left promiscuous mode [ 755.584281][ T8073] device hsr_slave_1 left promiscuous mode [ 755.653233][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 755.666280][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 755.677720][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 755.728040][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 755.822180][ T8073] bond0 (unregistering): Released all slaves [ 755.927385][T17425] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 755.939765][T17425] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 755.957067][T17425] team0: Port device team_slave_0 added [ 755.963826][T17425] team0: Port device team_slave_1 added [ 756.036888][T17425] device hsr_slave_0 entered promiscuous mode [ 756.074467][T17425] device hsr_slave_1 entered promiscuous mode [ 756.124244][T17425] debugfs: Directory 'hsr0' with parent '/' already present! [ 756.168066][T17425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 756.179496][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 756.190463][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 756.199819][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 756.210556][T17425] 8021q: adding VLAN 0 to HW filter on device team0 [ 756.342357][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 756.351697][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 756.365727][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 756.372800][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 756.398741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 756.409841][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 756.421934][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 756.440073][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 756.447213][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 756.460753][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 756.486867][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 756.500979][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 756.510125][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 756.525351][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 756.537048][T17425] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 756.555073][T17425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 756.565184][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 756.603380][T17425] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:38 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:38 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:38 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:38 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:38 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\xe0', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:38 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:38 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:38 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:38 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:38 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:38 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:38 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:39 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="be2ac03446eab341853330349e6bed410bfba80fe822a073293f5624783fb904fad617a0a244e44cd619c143cfbb0cbabcc6c9e99f87014c9988e668826b64cc6c7ff80c7a7ca68a09f40b3c50bedf591731a6a41d1895b025b1cc55553e50371cf9034fbe79bf0a25b9c2e8915e2fd8821ea4c96efefab871bf94be969f732f4f8ee01fb02ebfa6d8eab766b90615dc4381b3ba223cd63f7b3287b752523eb6a3a94107000cfe362aca6d476a842ef982ff9c1091f58da71e8088a7001f7af5f2a4d594636dbc965a99c83443b2dad67d7d94d0d29160f2ddf3e91f8016be7351d98375017b782e788d7dd90c8214f274564dda43564d83508bc54c974598d9") fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000080)=0x200) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:39 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:39 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:39 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:39 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:39 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:39 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:39 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:39 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:39 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:39 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:39 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffff9c}) bind$pptp(r0, &(0x7f00000001c0)={0x18, 0x2, {0x3, @rand_addr=0x200}}, 0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8a800, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0x4, &(0x7f0000000080)=0x101, 0x4) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:39 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:39 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:39 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:39 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:39 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:39 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:39 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:39 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:39 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:39 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:39 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 759.300152][T17541] IPVS: ftp: loaded support on port[0] = 21 [ 759.412972][T17541] chnl_net:caif_netlink_parms(): no params data found [ 759.499032][T17541] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.506294][T17541] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.513910][T17541] device bridge_slave_0 entered promiscuous mode [ 759.521816][T17541] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.529007][T17541] bridge0: port 2(bridge_slave_1) entered disabled state [ 759.536678][T17541] device bridge_slave_1 entered promiscuous mode [ 759.613032][T17541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 759.625789][T17541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 759.700884][T17541] team0: Port device team_slave_0 added [ 759.709072][T17541] team0: Port device team_slave_1 added [ 759.766868][T17541] device hsr_slave_0 entered promiscuous mode [ 759.824588][T17541] device hsr_slave_1 entered promiscuous mode [ 759.864224][T17541] debugfs: Directory 'hsr0' with parent '/' already present! [ 759.941063][T17541] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.948349][T17541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 759.955722][T17541] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.962826][T17541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 760.057903][T17541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 760.068868][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 760.077713][ T9261] bridge0: port 1(bridge_slave_0) entered disabled state [ 760.086116][ T9261] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.094341][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 760.165493][T17541] 8021q: adding VLAN 0 to HW filter on device team0 [ 760.176317][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 760.184698][ T8156] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.191791][ T8156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 760.263745][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 760.272676][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.279793][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 760.295924][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 760.311520][ T8073] device bridge_slave_1 left promiscuous mode [ 760.318190][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.385240][ T8073] device bridge_slave_0 left promiscuous mode [ 760.391535][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state [ 762.044825][ T8073] device hsr_slave_0 left promiscuous mode [ 762.094284][ T8073] device hsr_slave_1 left promiscuous mode [ 762.153040][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 762.165385][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 762.176221][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 762.219192][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 762.281764][ T8073] bond0 (unregistering): Released all slaves [ 762.401093][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 762.409785][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 762.418126][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 762.432035][T17541] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 762.443450][T17541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 762.452966][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 762.461737][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 762.483375][T17541] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:44 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 23:14:44 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:44 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:44 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:44 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:44 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:44 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:44 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:44 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:44 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:44 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:44 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:45 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x5}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r1, @in={{0x2, 0x4e20, @broadcast}}, 0x7, 0x0, 0x8, 0xd6, 0xa}, 0x98) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(r3, 0x0, 0x200, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:45 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:45 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:45 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:45 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:45 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:45 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:45 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:45 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:45 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x80000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffff, 0x404602) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:45 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:45 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:45 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:45 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:45 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:45 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:45 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:45 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:45 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 765.348968][T17657] IPVS: ftp: loaded support on port[0] = 21 [ 765.406318][T17657] chnl_net:caif_netlink_parms(): no params data found [ 765.489974][T17657] bridge0: port 1(bridge_slave_0) entered blocking state [ 765.497325][T17657] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.504956][T17657] device bridge_slave_0 entered promiscuous mode [ 765.512542][T17657] bridge0: port 2(bridge_slave_1) entered blocking state [ 765.519759][T17657] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.527804][T17657] device bridge_slave_1 entered promiscuous mode [ 765.600892][T17657] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 765.611912][T17657] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 765.630032][T17657] team0: Port device team_slave_0 added [ 765.637354][T17657] team0: Port device team_slave_1 added [ 765.706871][T17657] device hsr_slave_0 entered promiscuous mode [ 765.774520][T17657] device hsr_slave_1 entered promiscuous mode [ 765.824299][T17657] debugfs: Directory 'hsr0' with parent '/' already present! [ 765.896448][T17657] bridge0: port 2(bridge_slave_1) entered blocking state [ 765.903520][T17657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 765.910892][T17657] bridge0: port 1(bridge_slave_0) entered blocking state [ 765.917964][T17657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 765.949597][T17657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 766.021842][T17657] 8021q: adding VLAN 0 to HW filter on device team0 [ 766.029727][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 766.037844][ T9261] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.045435][ T9261] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.053263][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 766.067182][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 766.075926][ T8156] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.082952][ T8156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 766.151484][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 766.160280][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.167419][ T8050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 766.183788][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 766.252264][ T8156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 766.268253][T17657] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 766.279011][T17657] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 766.292569][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 766.302575][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 766.311466][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 766.320327][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 766.400628][T17657] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:48 executing program 1: mkdir(0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x440, 0x0) r1 = accept$nfc_llcp(r0, &(0x7f0000000180), &(0x7f0000000080)=0x60) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fsetxattr$security_evm(r1, &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340)=@sha1={0x1, "7035cd202fa4932b9c6795ecf1ee658f134129fe"}, 0x15, 0x1) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@sha1={0x1, "3f6a0cbea120bba8a7adb910223a3270048b807e"}, 0x15, 0x3) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:48 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:48 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:48 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:48 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) [ 766.535190][ T8073] device bridge_slave_1 left promiscuous mode [ 766.541406][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:14:48 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 766.621620][ T8073] device bridge_slave_0 left promiscuous mode [ 766.629842][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:14:48 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:48 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:48 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:48 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 768.584894][ T8073] device hsr_slave_0 left promiscuous mode [ 768.654290][ T8073] device hsr_slave_1 left promiscuous mode [ 768.740810][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 768.755968][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 768.768371][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 768.830100][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 768.915030][ T8073] bond0 (unregistering): Released all slaves 23:14:50 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x101, 0x10240) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:50 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:50 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:50 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:50 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:50 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:51 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:51 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001004, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:51 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:51 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:51 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:51 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:51 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:51 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 770.906305][T17767] IPVS: ftp: loaded support on port[0] = 21 [ 770.962946][T17767] chnl_net:caif_netlink_parms(): no params data found [ 770.986561][T17767] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.993712][T17767] bridge0: port 1(bridge_slave_0) entered disabled state [ 771.001503][T17767] device bridge_slave_0 entered promiscuous mode [ 771.010317][T17767] bridge0: port 2(bridge_slave_1) entered blocking state [ 771.017717][T17767] bridge0: port 2(bridge_slave_1) entered disabled state [ 771.025812][T17767] device bridge_slave_1 entered promiscuous mode [ 771.040530][T17767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 771.051423][T17767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 771.069548][T17767] team0: Port device team_slave_0 added [ 771.076490][T17767] team0: Port device team_slave_1 added [ 771.126666][T17767] device hsr_slave_0 entered promiscuous mode [ 771.174735][T17767] device hsr_slave_1 entered promiscuous mode [ 771.247436][T17767] debugfs: Directory 'hsr0' with parent '/' already present! [ 771.375877][T17767] bridge0: port 2(bridge_slave_1) entered blocking state [ 771.382943][T17767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 771.390319][T17767] bridge0: port 1(bridge_slave_0) entered blocking state [ 771.397456][T17767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 771.485382][T17767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 771.497489][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 771.505553][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 771.513007][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 771.521346][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 771.593233][T17767] 8021q: adding VLAN 0 to HW filter on device team0 [ 771.604976][ T9261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 771.613374][ T9261] bridge0: port 1(bridge_slave_0) entered blocking state [ 771.620474][ T9261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 771.701910][T17767] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 771.712608][T17767] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 771.724893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 771.733226][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 771.740324][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 771.748212][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 771.756982][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 771.766267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 771.774699][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 771.784554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 771.792114][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 771.866308][T17767] 8021q: adding VLAN 0 to HW filter on device batadv0 23:14:53 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) dup2(r0, r0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:53 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:53 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:53 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:53 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:53 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:53 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:53 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:53 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:53 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:53 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:54 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) fcntl$setown(r0, 0x8, r1) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/125, 0x7d) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) 23:14:54 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:54 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:54 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:54 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:54 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:54 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) [ 772.801373][ T8073] device bridge_slave_1 left promiscuous mode [ 772.823415][ T8073] bridge0: port 2(bridge_slave_1) entered disabled state 23:14:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:54 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:54 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) [ 772.916436][ T8073] device bridge_slave_0 left promiscuous mode [ 772.955008][ T8073] bridge0: port 1(bridge_slave_0) entered disabled state 23:14:54 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:54 executing program 1: 23:14:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:54 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:54 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:54 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) 23:14:54 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:54 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:54 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000240)="30b960f7a5f163fcd793901e2fd53b4bb994bbc26a50d34e553d4a6028cfdc205712e85a9e27a2941813c4febf9d194acb8d9380b44c61880e3cb688", 0x3c}, {&(0x7f0000000280)="b3bec9dfb39150b3fbd91e91cbc97e30148f631b15d61d0beb5ed096f02eb2752d56992128d8a97cb787fa8ff24426645b377a6cec7f1a0298b442696ee6b4a1263381b9b3f1b0f5c13f596203ca0b1dad5d1cac0dfca991430cb19bb512647d4fde6d4e034dcaf43d79b96316f4748153f8470ee71a8efff35b0fc75085a5270724f49d974d8e363a45bc8da3c2746356bf6ad32251d785ea0acf99c432adadb5b37e26794fd8bbf1619cef0495c5bf86e91c4a5a1ed54e900c0978c435e46697a8c253689694db2302ec46485d785d3e778123a31a4978e8d878f28a", 0xdd}], 0x2, 0xd) 23:14:54 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) 23:14:55 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e24, @empty}}) 23:14:55 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000940)={0x5, 0x0, "e53a9799cd487cdcc2e625d61c6c1c5820dae0ef5f79bb647a429da36876a90a", 0x4, 0x6e1, 0x6, 0x5, 0x1e}) 23:14:55 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'os2.', '!\x00'}) [ 775.224839][ T8073] device hsr_slave_0 left promiscuous mode [ 775.264257][ T8073] device hsr_slave_1 left promiscuous mode [ 775.313348][ T8073] team0 (unregistering): Port device team_slave_1 removed [ 775.325534][ T8073] team0 (unregistering): Port device team_slave_0 removed [ 775.335899][ T8073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 775.390798][ T8073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 775.473751][ T8073] bond0 (unregistering): Released all slaves [ 775.598825][T17884] IPVS: ftp: loaded support on port[0] = 21 [ 775.660497][T17884] chnl_net:caif_netlink_parms(): no params data found [ 775.676992][ T8073] ------------[ cut here ]------------ [ 775.682583][ T8073] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 775.682789][ T8073] WARNING: CPU: 0 PID: 8073 at lib/debugobjects.c:484 debug_check_no_obj_freed+0x464/0x5b0 [ 775.703301][ T8073] Kernel panic - not syncing: panic_on_warn set ... [ 775.703334][T17884] kobject: 'veth0_to_bridge' (000000004b3f1990): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge' [ 775.709875][ T8073] CPU: 0 PID: 8073 Comm: kworker/u4:5 Not tainted 5.2.0+ #29 [ 775.709881][ T8073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.709952][ T8073] Workqueue: netns cleanup_net [ 775.722176][T17884] kobject: 'queues' (00000000a78ff5d9): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 775.729285][ T8073] Call Trace: [ 775.729307][ T8073] dump_stack+0x1d8/0x2f8 [ 775.729363][ T8073] panic+0x29b/0x7d9 [ 775.729375][ T8073] ? __warn+0x126/0x230 [ 775.740178][T17884] kobject: 'queues' (00000000a78ff5d9): kobject_uevent_env [ 775.744152][ T8073] ? nmi_panic+0x97/0x97 [ 775.744197][ T8073] ? __probe_kernel_read+0x140/0x1a0 [ 775.744231][ T8073] ? is_valid_bugaddr+0x81/0x100 [ 775.755272][T17884] kobject: 'queues' (00000000a78ff5d9): kobject_uevent_env: filter function caused the event to drop! [ 775.758464][ T8073] __warn+0x22f/0x230 [ 775.762785][T17884] kobject: 'rx-0' (00000000866c3993): kobject_add_internal: parent: 'queues', set: 'queues' [ 775.766637][ T8073] ? debug_check_no_obj_freed+0x464/0x5b0 [ 775.766654][ T8073] report_bug+0x190/0x290 [ 775.766668][ T8073] ? debug_check_no_obj_freed+0x464/0x5b0 [ 775.766682][ T8073] do_error_trap+0xd7/0x440 [ 775.770854][T17884] kobject: 'rx-0' (00000000866c3993): kobject_uevent_env [ 775.777971][ T8073] do_invalid_op+0x36/0x40 [ 775.777980][ T8073] ? debug_check_no_obj_freed+0x464/0x5b0 [ 775.777990][ T8073] invalid_op+0x14/0x20 [ 775.778000][ T8073] RIP: 0010:debug_check_no_obj_freed+0x464/0x5b0 [ 775.778014][ T8073] Code: 08 48 89 df e8 3d bc 4a fe 4c 8b 03 48 c7 c7 ea 91 87 88 48 c7 c6 d4 e9 9f 88 4c 89 e2 44 89 f9 4d 89 e9 31 c0 e8 0c 7a e1 fd <0f> 0b 4c 8b 6d a8 ff 05 44 64 96 05 49 83 c5 30 4c 89 e8 48 c1 e8 [ 775.782293][T17884] kobject: 'rx-0' (00000000866c3993): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/rx-0' [ 775.787489][ T8073] RSP: 0018:ffff88807cda7708 EFLAGS: 00010046 [ 775.787497][ T8073] RAX: 53cf4d4853638800 RBX: ffffffff88cd9f40 RCX: ffff88807cd98600 [ 775.787503][ T8073] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 775.787509][ T8073] RBP: ffff88807cda77a0 R08: ffffffff81600b64 R09: ffffed1015d440c2 [ 775.787515][ T8073] R10: ffffed1015d440c2 R11: 0000000000000000 R12: ffffffff8893075f [ 775.787519][ T8073] R13: ffffffff814f1010 R14: dffffc0000000000 R15: 0000000000000000 [ 775.787532][ T8073] ? queue_work_node+0x340/0x340 [ 775.787589][ T8073] ? vprintk_emit+0x2d4/0x3a0 [ 775.787604][ T8073] ? debug_check_no_obj_freed+0x464/0x5b0 [ 775.792598][T17884] kobject: 'tx-0' (0000000049b115c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 775.803447][ T8073] ? kvfree+0x47/0x50 [ 775.803457][ T8073] kfree+0x107/0x200 [ 775.803468][ T8073] kvfree+0x47/0x50 [ 775.815105][T17884] kobject: 'tx-0' (0000000049b115c7): kobject_uevent_env [ 775.817546][ T8073] netdev_freemem+0x3e/0x60 [ 775.823215][T17884] kobject: 'tx-0' (0000000049b115c7): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/tx-0' [ 775.827506][ T8073] netdev_release+0x79/0xa0 [ 775.827515][ T8073] ? netdev_uevent+0xa0/0xa0 [ 775.827578][ T8073] device_release+0x74/0x1a0 [ 775.827594][ T8073] kobject_cleanup+0x2f7/0x4c0 [ 775.827609][ T8073] kobject_put+0xad/0xe0 [ 775.827621][ T8073] netdev_run_todo+0xc7f/0xe10 [ 775.834882][T17884] kobject: 'batman_adv' (0000000000b477ff): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 775.837799][ T8073] ? netdev_refcnt_read+0x1c0/0x1c0 [ 775.850013][T17884] kobject: 'bridge_slave_0' (00000000104d4a00): kobject_add_internal: parent: 'net', set: 'devices' [ 775.854868][ T8073] ? unregister_netdevice_queue+0x277/0x500 [ 775.854880][ T8073] ? alloc_netdev_mqs+0xe50/0xe50 [ 775.854961][ T8073] ? br_dev_delete+0x10d/0x120 [ 775.854975][ T8073] rtnl_unlock+0xe/0x10 [ 775.859784][T17884] kobject: 'bridge_slave_0' (00000000104d4a00): kobject_uevent_env [ 775.865406][ T8073] default_device_exit_batch+0x71c/0x790 [ 775.865418][ T8073] ? default_device_exit+0x260/0x260 [ 775.865461][ T8073] ? wait_woken+0x2c0/0x2c0 [ 775.865477][ T8073] ? rtnl_unlock+0xe/0x10 [ 775.865518][ T8073] ? cfg802154_pernet_exit+0xce/0xe0 [ 775.865526][ T8073] ? default_device_exit+0x260/0x260 [ 775.865542][ T8073] cleanup_net+0x77c/0xb30 [ 775.891174][T17884] kobject: 'bridge_slave_0' (00000000104d4a00): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0' [ 775.896909][ T8073] ? ops_free_list+0x360/0x360 [ 775.896967][ T8073] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 775.896981][ T8073] process_one_work+0x83b/0x1150 [ 775.903122][T17884] kobject: 'queues' (00000000f388da6a): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 775.910979][ T8073] ? rescuer_thread+0x1670/0x1670 [ 775.910987][ T8073] ? worker_thread+0x10de/0x1640 [ 775.911003][ T8073] worker_thread+0xc01/0x1640 [ 775.911029][ T8073] kthread+0x332/0x350 [ 775.911036][ T8073] ? rcu_lock_release+0x30/0x30 [ 775.911044][ T8073] ? kthread_blkcg+0xe0/0xe0 [ 775.911059][ T8073] ret_from_fork+0x24/0x30 [ 775.920386][ T8073] Kernel Offset: disabled [ 776.195465][ T8073] Rebooting in 86400 seconds..