ETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2989.601820][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2989.610083][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2989.620159][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2989.629167][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2989.641182][T16154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2989.649924][T16154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2989.659471][T16154] bridge0: port 1(bridge_slave_0) entered blocking state [ 2989.666555][T16154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2989.681210][T24200] 8021q: adding VLAN 0 to HW filter on device team0 [ 2989.694659][T24193] device veth1_vlan entered promiscuous mode [ 2989.704534][T24201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2989.728552][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2989.736857][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2989.745742][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2989.753685][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2989.763100][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2989.771968][T15792] bridge0: port 2(bridge_slave_1) entered blocking state [ 2989.778989][T15792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2989.787062][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2989.822764][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2989.841898][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2989.859095][T23311] bridge0: port 1(bridge_slave_0) entered blocking state [ 2989.866362][T23311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2989.874427][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2989.883498][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2989.892121][T23311] bridge0: port 2(bridge_slave_1) entered blocking state [ 2989.899313][T23311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2989.907292][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2989.916144][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2989.924959][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2989.934201][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2989.942989][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2989.952158][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2989.960271][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2989.978232][T24201] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2990.001781][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2990.009460][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2990.028552][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2990.037501][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2990.046591][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2990.055230][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2990.063581][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2990.072087][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2990.080726][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2990.090062][T24203] device veth0_vlan entered promiscuous mode [ 2990.125986][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2990.138867][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2990.146954][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2990.156218][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2990.177889][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2990.187811][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2990.197155][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2990.216389][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2990.225808][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2990.234715][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2990.243406][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2990.258057][T24200] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2990.288176][T24200] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2990.313146][T24202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2990.334641][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2990.343443][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2990.361999][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2990.370860][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2990.380645][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 16:01:11 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 2990.408642][T24203] device veth1_vlan entered promiscuous mode [ 2990.436657][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2990.445617][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2990.457433][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2990.465489][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2990.477262][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2990.486360][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2990.498666][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2990.506557][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2990.517304][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2990.527252][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2990.542991][T24200] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2990.561664][T24204] device veth0_vlan entered promiscuous mode [ 2990.580255][T24202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2990.714621][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2990.723162][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2990.731021][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2990.738796][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2990.747233][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2990.756594][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2990.764830][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2990.774510][T24201] device veth0_vlan entered promiscuous mode [ 2990.804529][T24204] device veth1_vlan entered promiscuous mode [ 2990.828153][T24201] device veth1_vlan entered promiscuous mode [ 2990.950407][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2990.982013][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2991.069695][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2991.088915][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2991.128356][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2991.165746][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2991.174922][T24257] bpf: Bad value for 'mode' [ 2991.195415][T24202] device veth0_vlan entered promiscuous mode [ 2991.207101][T24200] device veth0_vlan entered promiscuous mode [ 2991.233623][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2991.242499][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2991.265311][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2991.298161][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2991.335698][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2991.354420][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2991.369223][T24202] device veth1_vlan entered promiscuous mode [ 2991.444129][ T9164] tipc: TX() has been purged, node left! [ 2991.460192][T24200] device veth1_vlan entered promiscuous mode 16:01:12 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:12 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:12 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:12 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:12 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:12 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r2, @ANYRESDEC, @ANYBLOB=',\x00']) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) 16:01:12 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:12 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 2991.751626][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2991.760012][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2991.811846][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2991.822234][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:01:12 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r2, @ANYRESDEC, @ANYBLOB=',\x00']) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) 16:01:13 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:13 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:01:13 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:13 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 2993.173035][ T9164] device bridge_slave_1 left promiscuous mode [ 2993.179663][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 2993.251697][ T9164] device bridge_slave_0 left promiscuous mode [ 2993.257962][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 2993.336604][ T9164] device veth1_vlan left promiscuous mode [ 2993.351352][ T9164] device veth0_vlan left promiscuous mode [ 2994.301494][ T9164] device hsr_slave_0 left promiscuous mode [ 2994.341089][ T9164] device hsr_slave_1 left promiscuous mode [ 2994.388571][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 2994.399323][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 2994.409838][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2994.451015][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2994.570639][ T9164] bond0 (unregistering): Released all slaves [ 2994.702424][T24267] IPVS: ftp: loaded support on port[0] = 21 [ 2994.713084][T24271] IPVS: ftp: loaded support on port[0] = 21 [ 2994.715581][T24273] IPVS: ftp: loaded support on port[0] = 21 [ 2994.724772][T24272] IPVS: ftp: loaded support on port[0] = 21 [ 2994.986816][T24267] chnl_net:caif_netlink_parms(): no params data found [ 2995.015411][T24271] chnl_net:caif_netlink_parms(): no params data found [ 2995.064997][T24273] chnl_net:caif_netlink_parms(): no params data found [ 2995.128659][T24272] chnl_net:caif_netlink_parms(): no params data found [ 2995.148195][T24267] bridge0: port 1(bridge_slave_0) entered blocking state [ 2995.164769][T24267] bridge0: port 1(bridge_slave_0) entered disabled state [ 2995.174514][T24267] device bridge_slave_0 entered promiscuous mode [ 2995.194429][T24271] bridge0: port 1(bridge_slave_0) entered blocking state [ 2995.220975][T24271] bridge0: port 1(bridge_slave_0) entered disabled state [ 2995.228813][T24271] device bridge_slave_0 entered promiscuous mode [ 2995.239659][T24267] bridge0: port 2(bridge_slave_1) entered blocking state [ 2995.252735][T24267] bridge0: port 2(bridge_slave_1) entered disabled state [ 2995.264203][T24267] device bridge_slave_1 entered promiscuous mode [ 2995.281980][T24271] bridge0: port 2(bridge_slave_1) entered blocking state [ 2995.289117][T24271] bridge0: port 2(bridge_slave_1) entered disabled state [ 2995.297379][T24271] device bridge_slave_1 entered promiscuous mode [ 2995.345908][T24271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2995.357063][T24267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2995.366934][T24273] bridge0: port 1(bridge_slave_0) entered blocking state [ 2995.375574][T24273] bridge0: port 1(bridge_slave_0) entered disabled state [ 2995.386725][T24273] device bridge_slave_0 entered promiscuous mode [ 2995.395210][T24272] bridge0: port 1(bridge_slave_0) entered blocking state [ 2995.402472][T24272] bridge0: port 1(bridge_slave_0) entered disabled state [ 2995.410280][T24272] device bridge_slave_0 entered promiscuous mode [ 2995.419258][T24271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2995.432728][T24267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2995.441968][T24273] bridge0: port 2(bridge_slave_1) entered blocking state [ 2995.448993][T24273] bridge0: port 2(bridge_slave_1) entered disabled state [ 2995.456937][T24273] device bridge_slave_1 entered promiscuous mode [ 2995.463786][T24272] bridge0: port 2(bridge_slave_1) entered blocking state [ 2995.470828][T24272] bridge0: port 2(bridge_slave_1) entered disabled state [ 2995.479917][T24272] device bridge_slave_1 entered promiscuous mode [ 2995.521350][T24273] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2995.531294][T24271] team0: Port device team_slave_0 added [ 2995.538252][T24267] team0: Port device team_slave_0 added [ 2995.545487][T24267] team0: Port device team_slave_1 added [ 2995.561262][T24273] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2995.571498][T24271] team0: Port device team_slave_1 added [ 2995.586390][T24272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2995.632987][T24267] device hsr_slave_0 entered promiscuous mode [ 2995.671376][T24267] device hsr_slave_1 entered promiscuous mode [ 2995.733335][T24272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2995.751945][T24273] team0: Port device team_slave_0 added [ 2995.813187][T24271] device hsr_slave_0 entered promiscuous mode [ 2995.851355][T24271] device hsr_slave_1 entered promiscuous mode [ 2995.901059][T24271] debugfs: Directory 'hsr0' with parent '/' already present! [ 2995.918445][T24273] team0: Port device team_slave_1 added [ 2995.976876][T24272] team0: Port device team_slave_0 added [ 2996.033307][T24273] device hsr_slave_0 entered promiscuous mode [ 2996.061314][T24273] device hsr_slave_1 entered promiscuous mode [ 2996.101022][T24273] debugfs: Directory 'hsr0' with parent '/' already present! [ 2996.115817][T24272] team0: Port device team_slave_1 added [ 2996.163197][T24272] device hsr_slave_0 entered promiscuous mode [ 2996.201806][T24272] device hsr_slave_1 entered promiscuous mode [ 2996.208113][T10900] tipc: TX() has been purged, node left! [ 2996.214304][T10900] tipc: TX() has been purged, node left! [ 2996.220098][T10900] tipc: TX() has been purged, node left! [ 2996.226115][T10900] tipc: TX() has been purged, node left! [ 2996.232111][T10900] tipc: TX() has been purged, node left! [ 2996.241419][T24272] debugfs: Directory 'hsr0' with parent '/' already present! [ 2996.633274][T24271] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2996.662095][T24267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2996.807753][T24272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2996.818031][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2996.827425][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2996.841890][T24267] 8021q: adding VLAN 0 to HW filter on device team0 [ 2996.849664][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2996.857980][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2997.005074][T24271] 8021q: adding VLAN 0 to HW filter on device team0 [ 2997.019121][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2997.028328][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2997.037520][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.044607][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2997.053179][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2997.062651][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2997.072792][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state [ 2997.079813][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2997.087793][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2997.097253][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2997.106539][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2997.115268][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.122408][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2997.131585][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2997.139667][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2997.151049][T24273] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2997.305268][T24272] 8021q: adding VLAN 0 to HW filter on device team0 [ 2997.312697][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2997.321353][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2997.329239][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2997.339459][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2997.348247][T17599] bridge0: port 2(bridge_slave_1) entered blocking state [ 2997.355373][T17599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2997.363889][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2997.373300][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2997.382519][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2997.391192][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2997.399875][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2997.409000][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2997.418091][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2997.426499][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2997.435265][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2997.446160][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2997.454717][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2997.463378][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2997.480165][T24273] 8021q: adding VLAN 0 to HW filter on device team0 [ 2997.614020][T24271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2997.622228][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2997.631003][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2997.639524][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2997.648337][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2997.656484][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2997.666113][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2997.683896][T24267] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2997.694540][T24267] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2997.831860][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2997.840400][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2997.849214][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2997.857942][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2997.866817][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2997.875382][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.882526][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2997.890516][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2997.898999][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2997.907576][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2997.916479][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2997.925292][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.932378][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2997.941971][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2997.949906][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2997.958062][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2997.966441][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2997.975523][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2997.984346][ T8066] bridge0: port 2(bridge_slave_1) entered blocking state [ 2997.991432][ T8066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2998.143160][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2998.152202][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2998.160784][T15792] bridge0: port 2(bridge_slave_1) entered blocking state [ 2998.167966][T15792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2998.176101][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2998.185298][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2998.195081][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2998.202983][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2998.210541][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2998.219814][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2998.234077][T24271] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2998.257165][T24267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2998.395286][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2998.403836][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2998.413028][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2998.421976][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2998.431287][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2998.440586][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2998.449585][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2998.458294][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2998.467149][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2998.475962][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2998.483380][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2998.491390][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2998.505997][T24273] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2998.517169][T24273] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2998.531952][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2998.540574][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2998.557322][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2998.572367][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2998.581281][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2998.726040][T24272] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2998.740264][T24272] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2998.755272][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2998.764240][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2998.773575][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2998.782901][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2998.800498][T24273] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2998.820590][T10900] device bridge_slave_1 left promiscuous mode [ 2998.826938][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 2998.861545][T10900] device bridge_slave_0 left promiscuous mode [ 2998.867797][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 2998.934192][T10900] device bridge_slave_1 left promiscuous mode [ 2998.940533][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 2998.981777][T10900] device bridge_slave_0 left promiscuous mode [ 2998.988120][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 2999.043329][T10900] device bridge_slave_1 left promiscuous mode [ 2999.049630][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 2999.091942][T10900] device bridge_slave_0 left promiscuous mode [ 2999.098147][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 2999.154504][T10900] device bridge_slave_1 left promiscuous mode [ 2999.161149][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 2999.211677][T10900] device bridge_slave_0 left promiscuous mode [ 2999.217863][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 2999.254444][T10900] device bridge_slave_1 left promiscuous mode [ 2999.260851][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 2999.311789][T10900] device bridge_slave_0 left promiscuous mode [ 2999.318145][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 2999.380467][T10900] device veth1_vlan left promiscuous mode [ 2999.386516][T10900] device veth0_vlan left promiscuous mode [ 2999.392705][T10900] device veth1_vlan left promiscuous mode [ 2999.398430][T10900] device veth0_vlan left promiscuous mode [ 2999.404584][T10900] device veth1_vlan left promiscuous mode [ 2999.410483][T10900] device veth0_vlan left promiscuous mode [ 2999.416629][T10900] device veth1_vlan left promiscuous mode [ 2999.422782][T10900] device veth0_vlan left promiscuous mode [ 2999.428661][T10900] device veth1_vlan left promiscuous mode [ 2999.435332][T10900] device veth0_vlan left promiscuous mode [ 3003.535051][T10900] device hsr_slave_0 left promiscuous mode [ 3003.591120][T10900] device hsr_slave_1 left promiscuous mode [ 3003.667276][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3003.678411][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3003.688339][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3003.735075][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3003.795620][T10900] bond0 (unregistering): Released all slaves [ 3003.971410][T10900] device hsr_slave_0 left promiscuous mode [ 3004.011351][T10900] device hsr_slave_1 left promiscuous mode [ 3004.067180][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3004.077534][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3004.087743][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3004.135359][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3004.215185][T10900] bond0 (unregistering): Released all slaves [ 3004.411518][T10900] device hsr_slave_0 left promiscuous mode [ 3004.461055][T10900] device hsr_slave_1 left promiscuous mode [ 3004.507692][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3004.518360][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3004.528558][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3004.584979][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3004.664606][T10900] bond0 (unregistering): Released all slaves [ 3004.861552][T10900] device hsr_slave_0 left promiscuous mode [ 3004.901146][T10900] device hsr_slave_1 left promiscuous mode [ 3004.958229][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3004.968872][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3004.979647][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3005.037237][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3005.103643][T10900] bond0 (unregistering): Released all slaves [ 3005.311491][T10900] device hsr_slave_0 left promiscuous mode [ 3005.351257][T10900] device hsr_slave_1 left promiscuous mode [ 3005.398145][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3005.410422][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3005.420752][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3005.454965][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3005.514739][T10900] bond0 (unregistering): Released all slaves [ 3005.589956][T24272] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3005.597645][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3005.606180][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3005.614108][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3005.648195][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3005.657774][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3005.672914][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3005.682339][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3005.695023][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3005.703904][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3005.712891][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3005.721918][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3005.731286][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3005.739184][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3005.754322][T24271] device veth0_vlan entered promiscuous mode [ 3005.765877][T24271] device veth1_vlan entered promiscuous mode [ 3005.773673][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3005.789330][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3005.798232][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3005.811767][T24267] device veth0_vlan entered promiscuous mode [ 3005.832589][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3005.840821][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3005.851887][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3005.862834][T24267] device veth1_vlan entered promiscuous mode [ 3005.881890][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3005.890132][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3005.898725][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3005.932489][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3005.967377][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3005.976443][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3006.024748][T24273] device veth0_vlan entered promiscuous mode [ 3006.037906][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3006.046818][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3006.096297][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3006.118386][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3006.157821][T24273] device veth1_vlan entered promiscuous mode [ 3006.178265][T24272] device veth0_vlan entered promiscuous mode [ 3006.193121][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 16:01:27 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:01:27 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:27 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3006.205227][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3006.221933][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3006.238234][T24272] device veth1_vlan entered promiscuous mode [ 3006.266183][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3006.298946][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 16:01:27 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='mode=00000000000000000000777,mode=00000000000000000000006,mode=00000000000000000', @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3006.325088][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3006.341859][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 16:01:27 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:27 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r2, @ANYRESDEC, @ANYBLOB=',\x00']) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) [ 3006.844018][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:01:27 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:01:28 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:01:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='mode=00000000000000000000777,mode=00000000000000000000006,mode=00000000000000000', @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:01:28 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='mode=00000000000000000000777,mode=00000000000000000000006,mode=00000000000000000', @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:01:28 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3008.533323][T24316] IPVS: ftp: loaded support on port[0] = 21 [ 3008.600468][T24316] chnl_net:caif_netlink_parms(): no params data found [ 3008.628458][T24316] bridge0: port 1(bridge_slave_0) entered blocking state [ 3008.635912][T24316] bridge0: port 1(bridge_slave_0) entered disabled state [ 3008.644279][T24316] device bridge_slave_0 entered promiscuous mode [ 3008.652076][T24316] bridge0: port 2(bridge_slave_1) entered blocking state [ 3008.659295][T24316] bridge0: port 2(bridge_slave_1) entered disabled state [ 3008.667100][T24316] device bridge_slave_1 entered promiscuous mode [ 3008.684044][T24316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3008.694836][T24316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3008.712575][T24316] team0: Port device team_slave_0 added [ 3008.719046][T24316] team0: Port device team_slave_1 added [ 3008.772889][T24316] device hsr_slave_0 entered promiscuous mode [ 3008.821295][T24316] device hsr_slave_1 entered promiscuous mode [ 3008.881036][T24316] debugfs: Directory 'hsr0' with parent '/' already present! [ 3008.934110][T24316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3008.948101][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3008.956384][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3008.966640][T24316] 8021q: adding VLAN 0 to HW filter on device team0 [ 3008.976431][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3008.985434][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3008.993993][T18056] bridge0: port 1(bridge_slave_0) entered blocking state [ 3009.001057][T18056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3009.010120][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3009.021927][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3009.030541][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3009.039265][T18056] bridge0: port 2(bridge_slave_1) entered blocking state [ 3009.046312][T18056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3009.056574][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3009.068809][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3009.082196][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3009.090768][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3009.099580][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3009.108591][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3009.116900][T10900] tipc: TX() has been purged, node left! [ 3009.117753][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3009.131651][T10900] tipc: TX() has been purged, node left! [ 3009.138118][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3009.149115][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3009.157713][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3009.166264][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3009.174730][T10900] tipc: TX() has been purged, node left! [ 3009.181304][T24316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3009.193104][T10900] tipc: TX() has been purged, node left! [ 3009.219415][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3009.232366][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3009.245302][T24316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3009.606267][T24326] IPVS: ftp: loaded support on port[0] = 21 [ 3009.606310][T24324] IPVS: ftp: loaded support on port[0] = 21 [ 3009.617731][T24325] IPVS: ftp: loaded support on port[0] = 21 [ 3009.623890][T24327] IPVS: ftp: loaded support on port[0] = 21 [ 3009.955464][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3009.966780][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3010.095512][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3010.106058][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3010.114830][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3010.122701][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3010.134300][T24316] device veth0_vlan entered promiscuous mode [ 3010.175760][T24327] chnl_net:caif_netlink_parms(): no params data found [ 3010.216102][T24327] bridge0: port 1(bridge_slave_0) entered blocking state [ 3010.223331][T24327] bridge0: port 1(bridge_slave_0) entered disabled state [ 3010.231539][T24327] device bridge_slave_0 entered promiscuous mode [ 3010.370110][T24327] bridge0: port 2(bridge_slave_1) entered blocking state [ 3010.377445][T24327] bridge0: port 2(bridge_slave_1) entered disabled state [ 3010.385434][T24327] device bridge_slave_1 entered promiscuous mode [ 3010.402527][T24325] chnl_net:caif_netlink_parms(): no params data found [ 3010.412763][T24324] chnl_net:caif_netlink_parms(): no params data found [ 3010.430987][T24316] device veth1_vlan entered promiscuous mode [ 3010.555258][T24327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3010.574313][T24327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3010.734152][T24326] chnl_net:caif_netlink_parms(): no params data found [ 3010.751195][T24327] team0: Port device team_slave_0 added [ 3010.787668][T24327] team0: Port device team_slave_1 added [ 3010.798646][T24324] bridge0: port 1(bridge_slave_0) entered blocking state [ 3010.806180][T24324] bridge0: port 1(bridge_slave_0) entered disabled state [ 3010.814343][T24324] device bridge_slave_0 entered promiscuous mode [ 3010.951092][T24325] bridge0: port 1(bridge_slave_0) entered blocking state [ 3010.958209][T24325] bridge0: port 1(bridge_slave_0) entered disabled state [ 3010.966579][T24325] device bridge_slave_0 entered promiscuous mode [ 3010.974255][T24324] bridge0: port 2(bridge_slave_1) entered blocking state [ 3010.981577][T24324] bridge0: port 2(bridge_slave_1) entered disabled state [ 3010.989254][T24324] device bridge_slave_1 entered promiscuous mode [ 3011.077463][T24325] bridge0: port 2(bridge_slave_1) entered blocking state [ 3011.084964][T24325] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.093100][T24325] device bridge_slave_1 entered promiscuous mode [ 3011.100271][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3011.108359][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3011.123928][T24324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3011.139183][T24324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3011.153309][T24326] bridge0: port 1(bridge_slave_0) entered blocking state [ 3011.160357][T24326] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.168754][T24326] device bridge_slave_0 entered promiscuous mode [ 3011.232813][T24327] device hsr_slave_0 entered promiscuous mode [ 3011.271408][T24327] device hsr_slave_1 entered promiscuous mode [ 3011.301050][T24327] debugfs: Directory 'hsr0' with parent '/' already present! [ 3011.402689][T24326] bridge0: port 2(bridge_slave_1) entered blocking state [ 3011.409817][T24326] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.419159][T24326] device bridge_slave_1 entered promiscuous mode [ 3011.432335][T24324] team0: Port device team_slave_0 added [ 3011.445191][T24325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3011.464894][T24324] team0: Port device team_slave_1 added [ 3011.483279][T24325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3011.495251][T10900] device bridge_slave_1 left promiscuous mode [ 3011.502199][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.531828][T10900] device bridge_slave_0 left promiscuous mode [ 3011.538263][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.583586][T10900] device bridge_slave_1 left promiscuous mode [ 3011.589859][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.621608][T10900] device bridge_slave_0 left promiscuous mode [ 3011.627809][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.684221][T10900] device bridge_slave_1 left promiscuous mode [ 3011.690374][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.741524][T10900] device bridge_slave_0 left promiscuous mode [ 3011.747778][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.813914][T10900] device bridge_slave_1 left promiscuous mode [ 3011.820226][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3011.871660][T10900] device bridge_slave_0 left promiscuous mode [ 3011.877840][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3011.947590][T10900] device veth1_vlan left promiscuous mode [ 3011.953592][T10900] device veth0_vlan left promiscuous mode [ 3011.959450][T10900] device veth1_vlan left promiscuous mode [ 3011.965223][T10900] device veth0_vlan left promiscuous mode [ 3011.971263][T10900] device veth1_vlan left promiscuous mode [ 3011.977125][T10900] device veth0_vlan left promiscuous mode [ 3011.983354][T10900] device veth1_vlan left promiscuous mode [ 3011.989133][T10900] device veth0_vlan left promiscuous mode [ 3015.291413][T10900] device hsr_slave_0 left promiscuous mode [ 3015.341004][T10900] device hsr_slave_1 left promiscuous mode [ 3015.398047][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3015.408335][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3015.418080][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3015.484424][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3015.552617][T10900] bond0 (unregistering): Released all slaves [ 3015.761415][T10900] device hsr_slave_0 left promiscuous mode [ 3015.821226][T10900] device hsr_slave_1 left promiscuous mode [ 3015.868551][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3015.878673][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3015.888891][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3015.925239][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3015.985881][T10900] bond0 (unregistering): Released all slaves [ 3016.161553][T10900] device hsr_slave_0 left promiscuous mode [ 3016.201176][T10900] device hsr_slave_1 left promiscuous mode [ 3016.267679][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3016.277809][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3016.288285][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3016.324938][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3016.387367][T10900] bond0 (unregistering): Released all slaves [ 3016.561441][T10900] device hsr_slave_0 left promiscuous mode [ 3016.601204][T10900] device hsr_slave_1 left promiscuous mode [ 3016.657004][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3016.667143][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3016.677891][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3016.715238][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3016.774386][T10900] bond0 (unregistering): Released all slaves [ 3016.855027][T24326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3016.866468][T24326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3016.898394][T24326] team0: Port device team_slave_0 added [ 3016.905829][T24326] team0: Port device team_slave_1 added [ 3016.953126][T24326] device hsr_slave_0 entered promiscuous mode [ 3017.021407][T24326] device hsr_slave_1 entered promiscuous mode [ 3017.103391][T24324] device hsr_slave_0 entered promiscuous mode [ 3017.141402][T24324] device hsr_slave_1 entered promiscuous mode [ 3017.181035][T24324] debugfs: Directory 'hsr0' with parent '/' already present! [ 3017.195569][T24325] team0: Port device team_slave_0 added [ 3017.219892][T24325] team0: Port device team_slave_1 added [ 3017.303130][T24325] device hsr_slave_0 entered promiscuous mode [ 3017.351388][T24325] device hsr_slave_1 entered promiscuous mode [ 3017.411038][T24325] debugfs: Directory 'hsr0' with parent '/' already present! [ 3017.510800][T24327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3017.553193][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3017.561688][T23311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3017.572819][T24324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3017.589376][T24326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3017.598767][T24327] 8021q: adding VLAN 0 to HW filter on device team0 [ 3017.667762][T24325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3017.768787][T24326] 8021q: adding VLAN 0 to HW filter on device team0 [ 3017.775949][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3017.784761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3017.793621][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3017.802145][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 3017.809360][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3017.824243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3017.832193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3017.840054][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3017.848015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3017.855897][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3017.864942][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3017.873507][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 3017.881046][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3017.889488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3017.943047][T24324] 8021q: adding VLAN 0 to HW filter on device team0 [ 3017.970125][T24325] 8021q: adding VLAN 0 to HW filter on device team0 [ 3017.983033][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3017.993470][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3018.005662][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3018.014645][T22244] bridge0: port 1(bridge_slave_0) entered blocking state [ 3018.021714][T22244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3018.039108][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3018.049408][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3018.059827][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3018.069750][T22244] bridge0: port 2(bridge_slave_1) entered blocking state [ 3018.076799][T22244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3018.087444][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3018.096226][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3018.108274][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3018.117778][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3018.129874][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3018.139260][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3018.149832][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3018.168224][T24327] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3018.182412][T24327] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3018.201944][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3018.210411][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3018.220754][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3018.234026][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3018.244085][T22244] bridge0: port 1(bridge_slave_0) entered blocking state [ 3018.251531][T22244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3018.259959][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3018.269515][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3018.278653][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3018.288644][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3018.297670][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3018.307166][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3018.316988][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3018.327528][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3018.337421][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3018.348384][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3018.358378][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3018.368858][T22244] bridge0: port 1(bridge_slave_0) entered blocking state [ 3018.375967][T22244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3018.386984][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3018.395926][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3018.407456][T22244] bridge0: port 2(bridge_slave_1) entered blocking state [ 3018.414534][T22244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3018.427234][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3018.435388][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3018.445248][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3018.453792][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3018.462222][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3018.470789][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3018.491169][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3018.500309][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3018.510083][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3018.520223][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3018.529156][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3018.538024][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3018.546658][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3018.554489][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3018.565478][T24326] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3018.579272][T24326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3018.594413][T24327] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3018.612341][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3018.621400][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3018.631813][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3018.640313][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3018.649503][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3018.658139][T23321] bridge0: port 2(bridge_slave_1) entered blocking state [ 3018.665187][T23321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3018.673128][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3018.681871][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3018.690294][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3018.699458][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3018.707932][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3018.716442][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3018.732525][T24325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3018.750238][T24326] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3018.759558][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3018.769982][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3018.782375][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3018.790312][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3018.807311][T24324] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3018.818863][T24324] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3018.840032][T24325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3018.854665][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3018.869688][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3018.880574][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3018.890175][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3018.899447][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3018.908452][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3018.917129][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3018.926566][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3018.934229][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3018.950366][T24324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3018.972352][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3018.980053][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3018.999800][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3019.044159][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3019.054002][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3019.067851][T24327] device veth0_vlan entered promiscuous mode [ 3019.092142][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3019.104065][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3019.114838][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3019.127983][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3019.137587][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3019.152599][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3019.164733][T24327] device veth1_vlan entered promiscuous mode [ 3019.182125][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3019.190371][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3019.198893][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3019.216743][T24326] device veth0_vlan entered promiscuous mode [ 3019.224860][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3019.242543][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3019.250487][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3019.289002][T24326] device veth1_vlan entered promiscuous mode [ 3019.296313][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3019.307147][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3019.315983][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3019.325846][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3019.334811][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3019.343747][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3019.352177][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3019.361796][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3019.369617][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3019.379154][T24325] device veth0_vlan entered promiscuous mode [ 3019.406021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3019.441824][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3019.472064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3019.491876][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3019.510465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3019.533811][T24324] device veth0_vlan entered promiscuous mode [ 3019.547575][T24325] device veth1_vlan entered promiscuous mode [ 3019.583549][T24324] device veth1_vlan entered promiscuous mode [ 3019.811045][T10900] tipc: TX() has been purged, node left! [ 3019.858014][T24375] bpf: Bad value for 'mode' 16:01:40 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:40 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:40 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:40 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r1, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:40 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:40 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:41 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3020.186609][T16154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3020.194968][T16154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3020.203803][T16154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3020.212981][T16154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:01:41 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r2, @ANYRESDEC, @ANYBLOB=',\x00']) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) 16:01:41 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:41 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:41 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:41 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:41 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3021.265763][T10900] device bridge_slave_1 left promiscuous mode [ 3021.283649][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3021.344053][T10900] device bridge_slave_0 left promiscuous mode [ 3021.350558][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3021.407138][T10900] device veth1_vlan left promiscuous mode [ 3021.413129][T10900] device veth0_vlan left promiscuous mode [ 3022.411297][T10900] device hsr_slave_0 left promiscuous mode [ 3022.481054][T10900] device hsr_slave_1 left promiscuous mode [ 3022.538392][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3022.548775][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3022.559034][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3022.615133][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3022.715483][T10900] bond0 (unregistering): Released all slaves [ 3022.839594][T24377] IPVS: ftp: loaded support on port[0] = 21 [ 3022.985862][T24382] IPVS: ftp: loaded support on port[0] = 21 [ 3022.986214][T24383] IPVS: ftp: loaded support on port[0] = 21 [ 3023.000611][T24385] IPVS: ftp: loaded support on port[0] = 21 [ 3023.047542][T24384] IPVS: ftp: loaded support on port[0] = 21 [ 3023.110278][T24377] chnl_net:caif_netlink_parms(): no params data found [ 3023.266895][T24377] bridge0: port 1(bridge_slave_0) entered blocking state [ 3023.281006][T24377] bridge0: port 1(bridge_slave_0) entered disabled state [ 3023.288723][T24377] device bridge_slave_0 entered promiscuous mode [ 3023.308860][T24377] bridge0: port 2(bridge_slave_1) entered blocking state [ 3023.321904][T24377] bridge0: port 2(bridge_slave_1) entered disabled state [ 3023.329599][T24377] device bridge_slave_1 entered promiscuous mode [ 3023.363640][T24385] chnl_net:caif_netlink_parms(): no params data found [ 3023.404499][T24383] chnl_net:caif_netlink_parms(): no params data found [ 3023.440217][T24382] chnl_net:caif_netlink_parms(): no params data found [ 3023.472912][T24377] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3023.520154][T24377] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3023.560563][T24385] bridge0: port 1(bridge_slave_0) entered blocking state [ 3023.572680][T24385] bridge0: port 1(bridge_slave_0) entered disabled state [ 3023.580537][T24385] device bridge_slave_0 entered promiscuous mode [ 3023.612211][T24385] bridge0: port 2(bridge_slave_1) entered blocking state [ 3023.619360][T24385] bridge0: port 2(bridge_slave_1) entered disabled state [ 3023.629275][T24385] device bridge_slave_1 entered promiscuous mode [ 3023.646254][T24384] chnl_net:caif_netlink_parms(): no params data found [ 3023.668539][T24382] bridge0: port 1(bridge_slave_0) entered blocking state [ 3023.676174][T24382] bridge0: port 1(bridge_slave_0) entered disabled state [ 3023.684577][T24382] device bridge_slave_0 entered promiscuous mode [ 3023.692561][T24382] bridge0: port 2(bridge_slave_1) entered blocking state [ 3023.699607][T24382] bridge0: port 2(bridge_slave_1) entered disabled state [ 3023.707442][T24382] device bridge_slave_1 entered promiscuous mode [ 3023.715555][T24377] team0: Port device team_slave_0 added [ 3023.726198][T24383] bridge0: port 1(bridge_slave_0) entered blocking state [ 3023.733696][T24383] bridge0: port 1(bridge_slave_0) entered disabled state [ 3023.741823][T24383] device bridge_slave_0 entered promiscuous mode [ 3023.769001][T24377] team0: Port device team_slave_1 added [ 3023.778705][T24385] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3023.787879][T24383] bridge0: port 2(bridge_slave_1) entered blocking state [ 3023.795443][T24383] bridge0: port 2(bridge_slave_1) entered disabled state [ 3023.804046][T24383] device bridge_slave_1 entered promiscuous mode [ 3023.811020][T24384] bridge0: port 1(bridge_slave_0) entered blocking state [ 3023.818189][T24384] bridge0: port 1(bridge_slave_0) entered disabled state [ 3023.830090][T24384] device bridge_slave_0 entered promiscuous mode [ 3023.844883][T24382] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3023.859798][T24385] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3023.884812][T24383] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3023.894008][T24384] bridge0: port 2(bridge_slave_1) entered blocking state [ 3023.901980][T24384] bridge0: port 2(bridge_slave_1) entered disabled state [ 3023.909659][T24384] device bridge_slave_1 entered promiscuous mode [ 3023.918658][T24382] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3023.957625][T24383] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3023.984739][T24385] team0: Port device team_slave_0 added [ 3023.992810][T24383] team0: Port device team_slave_0 added [ 3023.999319][T24382] team0: Port device team_slave_0 added [ 3024.062784][T24377] device hsr_slave_0 entered promiscuous mode [ 3024.101416][T24377] device hsr_slave_1 entered promiscuous mode [ 3024.161333][T24377] debugfs: Directory 'hsr0' with parent '/' already present! [ 3024.174188][T24385] team0: Port device team_slave_1 added [ 3024.181780][T24384] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3024.191992][T24383] team0: Port device team_slave_1 added [ 3024.198749][T24382] team0: Port device team_slave_1 added [ 3024.212676][T24384] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3024.235061][T24384] team0: Port device team_slave_0 added [ 3024.250037][T24384] team0: Port device team_slave_1 added [ 3024.313367][T24383] device hsr_slave_0 entered promiscuous mode [ 3024.381474][T24383] device hsr_slave_1 entered promiscuous mode [ 3024.441405][T24383] debugfs: Directory 'hsr0' with parent '/' already present! [ 3024.502898][T24384] device hsr_slave_0 entered promiscuous mode [ 3024.571398][T24384] device hsr_slave_1 entered promiscuous mode [ 3024.621052][T24384] debugfs: Directory 'hsr0' with parent '/' already present! [ 3024.717305][T24385] device hsr_slave_0 entered promiscuous mode [ 3024.724495][T10900] tipc: TX() has been purged, node left! [ 3024.730261][T10900] tipc: TX() has been purged, node left! [ 3024.736161][T10900] tipc: TX() has been purged, node left! [ 3024.741956][T10900] tipc: TX() has been purged, node left! [ 3024.761644][T24385] device hsr_slave_1 entered promiscuous mode [ 3024.781060][T24385] debugfs: Directory 'hsr0' with parent '/' already present! [ 3024.853954][T24382] device hsr_slave_0 entered promiscuous mode [ 3024.891432][T24382] device hsr_slave_1 entered promiscuous mode [ 3024.931056][T24382] debugfs: Directory 'hsr0' with parent '/' already present! [ 3025.472301][T24377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3025.599110][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3025.607185][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3025.618309][T24377] 8021q: adding VLAN 0 to HW filter on device team0 [ 3025.748551][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3025.757492][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3025.765879][T18056] bridge0: port 1(bridge_slave_0) entered blocking state [ 3025.772947][T18056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3025.780786][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3025.789777][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3025.798274][T18056] bridge0: port 2(bridge_slave_1) entered blocking state [ 3025.805697][T18056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3025.813875][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3025.822898][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3025.832306][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3025.966062][T24382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3025.980689][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3025.989785][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3025.999053][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3026.008018][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3026.016956][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3026.029474][T24384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3026.046538][T24385] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3026.058830][T24382] 8021q: adding VLAN 0 to HW filter on device team0 [ 3026.072804][T24383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3026.080033][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3026.088306][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3026.096571][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3026.105118][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3026.215417][T24377] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3026.226925][T24377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3026.242336][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3026.250769][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3026.259418][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3026.268244][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3026.279293][T24384] 8021q: adding VLAN 0 to HW filter on device team0 [ 3026.293860][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3026.302941][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3026.312315][T23321] bridge0: port 1(bridge_slave_0) entered blocking state [ 3026.319341][T23321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3026.327303][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3026.335302][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3026.343406][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3026.352269][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3026.360822][T23321] bridge0: port 1(bridge_slave_0) entered blocking state [ 3026.367967][T23321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3026.376177][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3026.384317][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3026.393822][T24385] 8021q: adding VLAN 0 to HW filter on device team0 [ 3026.509578][T24383] 8021q: adding VLAN 0 to HW filter on device team0 [ 3026.518682][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3026.527047][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3026.535425][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3026.544182][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3026.552982][T23321] bridge0: port 1(bridge_slave_0) entered blocking state [ 3026.560052][T23321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3026.568073][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3026.576867][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3026.585415][T23321] bridge0: port 2(bridge_slave_1) entered blocking state [ 3026.592491][T23321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3026.600306][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3026.609164][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3026.617606][T23321] bridge0: port 2(bridge_slave_1) entered blocking state [ 3026.624804][T23321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3026.633540][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3026.651829][T24377] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3026.680425][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3026.689494][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3026.698318][T23321] bridge0: port 2(bridge_slave_1) entered blocking state [ 3026.705379][T23321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3026.713859][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3026.721707][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3026.729257][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3026.738538][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3026.747832][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3026.757111][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3026.766358][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3026.775810][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3026.785703][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3026.794684][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3026.803483][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3026.812412][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3026.821630][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3026.830531][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3026.839647][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3026.848734][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3026.859032][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3026.867365][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3026.876055][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3026.884710][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3026.997952][T24382] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3027.009098][T24382] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3027.030316][T24385] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3027.041543][T24385] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3027.055709][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3027.064238][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3027.073268][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3027.082327][ T9606] bridge0: port 1(bridge_slave_0) entered blocking state [ 3027.089401][ T9606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3027.097387][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3027.105756][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3027.114317][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3027.123046][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3027.131409][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3027.139778][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3027.148415][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3027.157000][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3027.165671][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3027.174313][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3027.183203][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3027.191790][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3027.200512][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3027.209034][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3027.222080][T24384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3027.240200][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3027.248648][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3027.257434][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3027.269498][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3027.278630][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3027.287276][ T9606] bridge0: port 2(bridge_slave_1) entered blocking state [ 3027.294364][ T9606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3027.302410][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3027.311915][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3027.330702][T24384] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3027.347898][T10900] device bridge_slave_1 left promiscuous mode [ 3027.355068][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3027.381938][T10900] device bridge_slave_0 left promiscuous mode [ 3027.388286][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3027.444382][T10900] device bridge_slave_1 left promiscuous mode [ 3027.450593][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3027.501984][T10900] device bridge_slave_0 left promiscuous mode [ 3027.508281][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3027.564311][T10900] device bridge_slave_1 left promiscuous mode [ 3027.570492][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3027.631696][T10900] device bridge_slave_0 left promiscuous mode [ 3027.637893][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3027.694029][T10900] device bridge_slave_1 left promiscuous mode [ 3027.700229][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3027.761544][T10900] device bridge_slave_0 left promiscuous mode [ 3027.767732][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3027.839154][T10900] device veth1_vlan left promiscuous mode [ 3027.845167][T10900] device veth0_vlan left promiscuous mode [ 3027.851096][T10900] device veth1_vlan left promiscuous mode [ 3027.856904][T10900] device veth0_vlan left promiscuous mode [ 3027.862850][T10900] device veth1_vlan left promiscuous mode [ 3027.868811][T10900] device veth0_vlan left promiscuous mode [ 3027.875288][T10900] device veth1_vlan left promiscuous mode [ 3027.881257][T10900] device veth0_vlan left promiscuous mode [ 3031.171237][T10900] device hsr_slave_0 left promiscuous mode [ 3031.211078][T10900] device hsr_slave_1 left promiscuous mode [ 3031.267536][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3031.279119][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3031.289785][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3031.334511][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3031.414425][T10900] bond0 (unregistering): Released all slaves [ 3031.601297][T10900] device hsr_slave_0 left promiscuous mode [ 3031.671037][T10900] device hsr_slave_1 left promiscuous mode [ 3031.748392][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3031.758933][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3031.768989][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3031.804888][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3031.874312][T10900] bond0 (unregistering): Released all slaves [ 3032.071548][T10900] device hsr_slave_0 left promiscuous mode [ 3032.131289][T10900] device hsr_slave_1 left promiscuous mode [ 3032.178468][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3032.189026][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3032.199064][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3032.235139][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3032.293625][T10900] bond0 (unregistering): Released all slaves [ 3032.521400][T10900] device hsr_slave_0 left promiscuous mode [ 3032.571074][T10900] device hsr_slave_1 left promiscuous mode [ 3032.638438][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3032.649092][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3032.659153][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3032.714569][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3032.794765][T10900] bond0 (unregistering): Released all slaves [ 3032.918620][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3032.926180][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3032.937517][T24382] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3032.959786][T24385] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3032.977129][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3032.986636][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3032.994503][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3033.003625][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3033.012474][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3033.021135][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3033.029775][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3033.038451][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3033.046765][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3033.054667][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3033.062295][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3033.071098][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3033.080205][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3033.093513][T24383] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3033.105135][T24383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3033.125947][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3033.135061][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3033.177879][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3033.186965][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3033.196177][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3033.204417][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3033.227621][T24377] device veth0_vlan entered promiscuous mode [ 3033.238738][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3033.248622][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3033.258006][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3033.267138][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3033.276357][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3033.284052][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3033.293323][T24383] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3033.310731][T24384] device veth0_vlan entered promiscuous mode [ 3033.322075][T24377] device veth1_vlan entered promiscuous mode [ 3033.344807][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3033.353680][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3033.363080][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3033.371446][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3033.380451][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3033.388978][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3033.404308][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3033.417308][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3033.426332][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3033.436014][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3033.445484][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3033.454127][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3033.463532][T24382] device veth0_vlan entered promiscuous mode [ 3033.472734][T24384] device veth1_vlan entered promiscuous mode [ 3033.490412][T24385] device veth0_vlan entered promiscuous mode [ 3033.501959][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3033.510220][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3033.518948][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3033.527447][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3033.562267][T24382] device veth1_vlan entered promiscuous mode [ 3033.583012][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3033.605343][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3033.626239][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3033.652802][T24385] device veth1_vlan entered promiscuous mode [ 3033.669395][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3033.677992][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3033.686669][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3033.712207][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3033.747769][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 16:01:54 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:54 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3033.917378][T24383] device veth0_vlan entered promiscuous mode [ 3033.975185][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3033.995030][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3034.034829][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 16:01:55 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r1, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:55 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r2, @ANYRESDEC, @ANYBLOB=',\x00']) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) [ 3034.094100][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3034.155914][T24383] device veth1_vlan entered promiscuous mode 16:01:55 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:55 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r2, @ANYRESDEC, @ANYBLOB=',\x00']) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) 16:01:55 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:55 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:56 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:56 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r1, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:56 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:56 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:01:56 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3036.493661][T24442] IPVS: ftp: loaded support on port[0] = 21 [ 3036.540951][T10900] tipc: TX() has been purged, node left! [ 3036.545563][T24442] chnl_net:caif_netlink_parms(): no params data found [ 3036.554095][T10900] tipc: TX() has been purged, node left! [ 3036.559996][T10900] tipc: TX() has been purged, node left! [ 3036.568039][T10900] tipc: TX() has been purged, node left! [ 3036.574911][T10900] tipc: TX() has been purged, node left! [ 3036.579128][T24442] bridge0: port 1(bridge_slave_0) entered blocking state [ 3036.587950][T24442] bridge0: port 1(bridge_slave_0) entered disabled state [ 3036.595873][T24442] device bridge_slave_0 entered promiscuous mode [ 3036.603492][T24442] bridge0: port 2(bridge_slave_1) entered blocking state [ 3036.610576][T24442] bridge0: port 2(bridge_slave_1) entered disabled state [ 3036.618609][T24442] device bridge_slave_1 entered promiscuous mode [ 3036.636778][T24442] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3036.647668][T24442] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3036.666606][T24442] team0: Port device team_slave_0 added [ 3036.673351][T24442] team0: Port device team_slave_1 added [ 3036.732954][T24442] device hsr_slave_0 entered promiscuous mode [ 3036.771359][T24442] device hsr_slave_1 entered promiscuous mode [ 3037.354078][T24442] bridge0: port 2(bridge_slave_1) entered blocking state [ 3037.361239][T24442] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3037.368556][T24442] bridge0: port 1(bridge_slave_0) entered blocking state [ 3037.375836][T24442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3037.384438][ T8066] bridge0: port 1(bridge_slave_0) entered disabled state [ 3037.392767][ T8066] bridge0: port 2(bridge_slave_1) entered disabled state [ 3037.412165][T24448] IPVS: ftp: loaded support on port[0] = 21 [ 3037.423172][T24447] IPVS: ftp: loaded support on port[0] = 21 [ 3037.424658][T24449] IPVS: ftp: loaded support on port[0] = 21 [ 3037.888771][T24442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3037.936040][T24448] chnl_net:caif_netlink_parms(): no params data found [ 3037.944915][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3037.955499][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3038.008425][T24448] bridge0: port 1(bridge_slave_0) entered blocking state [ 3038.015559][T24448] bridge0: port 1(bridge_slave_0) entered disabled state [ 3038.023687][T24448] device bridge_slave_0 entered promiscuous mode [ 3038.032722][T24442] 8021q: adding VLAN 0 to HW filter on device team0 [ 3038.039821][T24447] chnl_net:caif_netlink_parms(): no params data found [ 3038.167506][T24449] chnl_net:caif_netlink_parms(): no params data found [ 3038.176516][T24448] bridge0: port 2(bridge_slave_1) entered blocking state [ 3038.183903][T24448] bridge0: port 2(bridge_slave_1) entered disabled state [ 3038.192056][T24448] device bridge_slave_1 entered promiscuous mode [ 3038.228457][T24448] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3038.245589][T24448] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3038.265903][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3038.274597][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3038.283269][T22244] bridge0: port 1(bridge_slave_0) entered blocking state [ 3038.290327][T22244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3038.320848][T24448] team0: Port device team_slave_0 added [ 3038.328251][T24448] team0: Port device team_slave_1 added [ 3038.461473][T24447] bridge0: port 1(bridge_slave_0) entered blocking state [ 3038.468676][T24447] bridge0: port 1(bridge_slave_0) entered disabled state [ 3038.480347][T24447] device bridge_slave_0 entered promiscuous mode [ 3038.488905][T24447] bridge0: port 2(bridge_slave_1) entered blocking state [ 3038.496043][T24447] bridge0: port 2(bridge_slave_1) entered disabled state [ 3038.504377][T24447] device bridge_slave_1 entered promiscuous mode [ 3038.511968][T24449] bridge0: port 1(bridge_slave_0) entered blocking state [ 3038.519014][T24449] bridge0: port 1(bridge_slave_0) entered disabled state [ 3038.530494][T24449] device bridge_slave_0 entered promiscuous mode [ 3038.540062][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3038.552410][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3038.561274][T22243] bridge0: port 2(bridge_slave_1) entered blocking state [ 3038.568364][T22243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3038.708221][T24449] bridge0: port 2(bridge_slave_1) entered blocking state [ 3038.715737][T24449] bridge0: port 2(bridge_slave_1) entered disabled state [ 3038.723726][T24449] device bridge_slave_1 entered promiscuous mode [ 3038.745340][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3038.754867][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3038.764211][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3038.773398][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3038.782978][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3038.853574][T24448] device hsr_slave_0 entered promiscuous mode [ 3038.881405][T24448] device hsr_slave_1 entered promiscuous mode [ 3038.921586][T24448] debugfs: Directory 'hsr0' with parent '/' already present! [ 3038.934425][T24449] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3038.946228][T24447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3038.961492][T24447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3038.974919][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3038.983606][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3038.992713][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3039.002078][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3039.018894][T24449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3039.171779][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3039.180097][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3039.190704][T24447] team0: Port device team_slave_0 added [ 3039.202729][T24449] team0: Port device team_slave_0 added [ 3039.209131][T24442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3039.219034][T10900] device bridge_slave_1 left promiscuous mode [ 3039.225378][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3039.262083][T10900] device bridge_slave_0 left promiscuous mode [ 3039.268353][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3039.324673][T10900] device bridge_slave_1 left promiscuous mode [ 3039.331019][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3039.382023][T10900] device bridge_slave_0 left promiscuous mode [ 3039.388241][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3039.444006][T10900] device bridge_slave_1 left promiscuous mode [ 3039.450209][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3039.511958][T10900] device bridge_slave_0 left promiscuous mode [ 3039.518316][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3039.583596][T10900] device bridge_slave_1 left promiscuous mode [ 3039.589895][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3039.631539][T10900] device bridge_slave_0 left promiscuous mode [ 3039.638055][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3039.684425][T10900] device bridge_slave_1 left promiscuous mode [ 3039.690683][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3039.721842][T10900] device bridge_slave_0 left promiscuous mode [ 3039.728042][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3039.790359][T10900] device veth1_vlan left promiscuous mode [ 3039.796306][T10900] device veth0_vlan left promiscuous mode [ 3039.803127][T10900] device veth1_vlan left promiscuous mode [ 3039.808874][T10900] device veth0_vlan left promiscuous mode [ 3039.814888][T10900] device veth1_vlan left promiscuous mode [ 3039.820636][T10900] device veth0_vlan left promiscuous mode [ 3039.826793][T10900] device veth1_vlan left promiscuous mode [ 3039.834613][T10900] device veth0_vlan left promiscuous mode [ 3039.840587][T10900] device veth1_vlan left promiscuous mode [ 3039.846518][T10900] device veth0_vlan left promiscuous mode [ 3043.911190][T10900] device hsr_slave_0 left promiscuous mode [ 3043.951076][T10900] device hsr_slave_1 left promiscuous mode [ 3044.007778][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3044.018367][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3044.029045][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3044.074437][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3044.153161][T10900] bond0 (unregistering): Released all slaves [ 3044.351502][T10900] device hsr_slave_0 left promiscuous mode [ 3044.391168][T10900] device hsr_slave_1 left promiscuous mode [ 3044.467282][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3044.478233][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3044.488553][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3044.545233][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3044.623102][T10900] bond0 (unregistering): Released all slaves [ 3044.841577][T10900] device hsr_slave_0 left promiscuous mode [ 3044.881078][T10900] device hsr_slave_1 left promiscuous mode [ 3044.957442][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3044.967801][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3044.978108][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3045.024371][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3045.103104][T10900] bond0 (unregistering): Released all slaves [ 3045.311453][T10900] device hsr_slave_0 left promiscuous mode [ 3045.361156][T10900] device hsr_slave_1 left promiscuous mode [ 3045.427782][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3045.437952][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3045.448060][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3045.494246][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3045.553108][T10900] bond0 (unregistering): Released all slaves [ 3045.731770][T10900] device hsr_slave_0 left promiscuous mode [ 3045.771069][T10900] device hsr_slave_1 left promiscuous mode [ 3045.827382][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3045.837945][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3045.847740][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3045.894160][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3045.963353][T10900] bond0 (unregistering): Released all slaves [ 3046.047987][T24447] team0: Port device team_slave_1 added [ 3046.055534][T24449] team0: Port device team_slave_1 added [ 3046.113262][T24449] device hsr_slave_0 entered promiscuous mode [ 3046.161337][T24449] device hsr_slave_1 entered promiscuous mode [ 3046.201066][T24449] debugfs: Directory 'hsr0' with parent '/' already present! [ 3046.215519][T24442] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3046.248027][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3046.255833][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3046.313466][T24447] device hsr_slave_0 entered promiscuous mode [ 3046.361472][T24447] device hsr_slave_1 entered promiscuous mode [ 3046.421116][T24447] debugfs: Directory 'hsr0' with parent '/' already present! [ 3046.450221][T24448] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3046.498147][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3046.507116][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3046.516196][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3046.524894][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3046.540658][T24449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3046.548988][T24448] 8021q: adding VLAN 0 to HW filter on device team0 [ 3046.572366][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3046.581659][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3046.590079][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 3046.597384][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3046.605941][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3046.622021][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3046.630493][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3046.639782][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3046.648523][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3046.657111][T22244] bridge0: port 2(bridge_slave_1) entered blocking state [ 3046.664252][T22244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3046.672662][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3046.681830][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3046.689565][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3046.707564][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3046.716579][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3046.724518][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3046.732370][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3046.740819][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3046.750160][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3046.762567][T24442] device veth0_vlan entered promiscuous mode [ 3046.770534][T24449] 8021q: adding VLAN 0 to HW filter on device team0 [ 3046.787456][T24448] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3046.797875][T24448] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3046.809575][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3046.818446][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3046.829129][T22244] bridge0: port 1(bridge_slave_0) entered blocking state [ 3046.836330][T22244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3046.844646][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3046.853471][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3046.861930][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3046.870406][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3046.879216][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3046.887653][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3046.896570][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3046.904633][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3046.917013][T24447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3046.928423][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3046.937351][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3046.946467][T23321] bridge0: port 2(bridge_slave_1) entered blocking state [ 3046.953708][T23321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3046.965585][T24442] device veth1_vlan entered promiscuous mode [ 3046.974979][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3046.983428][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3047.105396][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3047.113910][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3047.123481][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3047.131513][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3047.151266][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3047.163045][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3047.172853][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3047.182341][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 16:02:08 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) 16:02:08 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3047.348852][T24449] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3047.379775][T24449] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3047.405777][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3047.431913][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3047.461278][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3047.469922][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3047.501535][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3047.511054][T24447] 8021q: adding VLAN 0 to HW filter on device team0 [ 3047.713626][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3047.731660][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3047.739161][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3047.781203][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3047.788756][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3047.815299][T24448] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3047.837104][T24449] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3047.854078][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3047.863445][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 16:02:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 3047.891523][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 3047.898652][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state 16:02:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 3047.967087][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3047.999300][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3048.039771][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3048.071483][ T8066] bridge0: port 2(bridge_slave_1) entered blocking state [ 3048.078572][ T8066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3048.111604][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3048.141370][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3048.171449][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3048.200982][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3048.209987][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3048.233890][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3048.273703][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3048.294652][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3048.324476][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3048.352437][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3048.363705][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3048.385153][T24447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3048.418136][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3048.443238][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3048.462359][T24447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3048.501928][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3048.509599][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3048.541124][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3048.550036][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3048.571762][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3048.580350][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3048.612401][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3048.620458][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3048.650547][T24448] device veth0_vlan entered promiscuous mode [ 3048.674063][T24449] device veth0_vlan entered promiscuous mode [ 3048.701161][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3048.709797][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3048.746750][T24448] device veth1_vlan entered promiscuous mode [ 3048.769861][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3048.792016][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3048.799960][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3048.834473][T24449] device veth1_vlan entered promiscuous mode [ 3048.876674][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3048.920268][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3048.955780][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3048.986419][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3049.007390][T24447] device veth0_vlan entered promiscuous mode [ 3049.028503][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3049.046384][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3049.072282][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3049.104128][T24447] device veth1_vlan entered promiscuous mode [ 3049.129575][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3049.144038][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3049.182719][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3049.281912][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:02:10 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:10 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) 16:02:10 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:10 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:10 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) 16:02:10 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:10 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 3049.925776][T24492] IPVS: ftp: loaded support on port[0] = 21 [ 3050.069813][T24492] chnl_net:caif_netlink_parms(): no params data found [ 3050.139216][T24492] bridge0: port 1(bridge_slave_0) entered blocking state [ 3050.161189][T24492] bridge0: port 1(bridge_slave_0) entered disabled state [ 3050.168995][T24492] device bridge_slave_0 entered promiscuous mode [ 3050.187751][T24492] bridge0: port 2(bridge_slave_1) entered blocking state [ 3050.206286][T24492] bridge0: port 2(bridge_slave_1) entered disabled state [ 3050.227268][T24492] device bridge_slave_1 entered promiscuous mode [ 3050.269723][T24492] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3050.300872][T24492] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3050.332965][T10900] tipc: TX() has been purged, node left! [ 3050.341413][T10900] tipc: TX() has been purged, node left! [ 3050.345086][T24492] team0: Port device team_slave_0 added [ 3050.353365][T10900] tipc: TX() has been purged, node left! [ 3050.373775][T10900] tipc: TX() has been purged, node left! [ 3050.374212][T24492] team0: Port device team_slave_1 added [ 3050.463742][T24492] device hsr_slave_0 entered promiscuous mode [ 3050.521499][T24492] device hsr_slave_1 entered promiscuous mode [ 3050.561043][T24492] debugfs: Directory 'hsr0' with parent '/' already present! [ 3050.962068][T24497] IPVS: ftp: loaded support on port[0] = 21 [ 3050.963068][T24496] IPVS: ftp: loaded support on port[0] = 21 [ 3051.349624][T24492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3051.480848][T24497] chnl_net:caif_netlink_parms(): no params data found [ 3051.491674][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3051.499387][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3051.528803][T24492] 8021q: adding VLAN 0 to HW filter on device team0 [ 3051.545160][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3051.555781][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3051.564524][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 3051.571671][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3051.579973][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3051.594324][T24496] chnl_net:caif_netlink_parms(): no params data found [ 3051.604113][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3051.613954][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3051.622708][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state [ 3051.629874][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3051.763657][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3051.782386][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3051.918909][T24497] bridge0: port 1(bridge_slave_0) entered blocking state [ 3051.926116][T24497] bridge0: port 1(bridge_slave_0) entered disabled state [ 3051.933997][T24497] device bridge_slave_0 entered promiscuous mode [ 3051.941804][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3051.950289][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3051.959086][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3051.967761][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3051.976878][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3051.985311][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3051.994019][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3052.002619][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3052.011220][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3052.020488][T24492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3052.038289][T24497] bridge0: port 2(bridge_slave_1) entered blocking state [ 3052.045458][T24497] bridge0: port 2(bridge_slave_1) entered disabled state [ 3052.053713][T24497] device bridge_slave_1 entered promiscuous mode [ 3052.156402][T24501] IPVS: ftp: loaded support on port[0] = 21 [ 3052.172646][T24496] bridge0: port 1(bridge_slave_0) entered blocking state [ 3052.179815][T24496] bridge0: port 1(bridge_slave_0) entered disabled state [ 3052.187971][T24496] device bridge_slave_0 entered promiscuous mode [ 3052.200416][T24496] bridge0: port 2(bridge_slave_1) entered blocking state [ 3052.208164][T24496] bridge0: port 2(bridge_slave_1) entered disabled state [ 3052.218825][T24496] device bridge_slave_1 entered promiscuous mode [ 3052.334615][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3052.342930][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3052.358913][T24496] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3052.371478][T24497] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3052.386060][T24492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3052.394947][T24496] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3052.406223][T24497] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3052.424471][T10900] device bridge_slave_1 left promiscuous mode [ 3052.431053][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3052.471794][T10900] device bridge_slave_0 left promiscuous mode [ 3052.478032][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3052.523769][T10900] device bridge_slave_1 left promiscuous mode [ 3052.529930][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3052.571575][T10900] device bridge_slave_0 left promiscuous mode [ 3052.577882][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3052.645455][T10900] device bridge_slave_1 left promiscuous mode [ 3052.651971][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3052.691826][T10900] device bridge_slave_0 left promiscuous mode [ 3052.698104][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3052.743412][T10900] device bridge_slave_1 left promiscuous mode [ 3052.749646][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3052.801501][T10900] device bridge_slave_0 left promiscuous mode [ 3052.807644][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3052.867432][T10900] device veth1_vlan left promiscuous mode [ 3052.873382][T10900] device veth0_vlan left promiscuous mode [ 3052.879399][T10900] device veth1_vlan left promiscuous mode [ 3052.885480][T10900] device veth0_vlan left promiscuous mode [ 3052.891599][T10900] device veth1_vlan left promiscuous mode [ 3052.897696][T10900] device veth0_vlan left promiscuous mode [ 3052.903893][T10900] device veth1_vlan left promiscuous mode [ 3052.909801][T10900] device veth0_vlan left promiscuous mode [ 3056.131238][T10900] device hsr_slave_0 left promiscuous mode [ 3056.181156][T10900] device hsr_slave_1 left promiscuous mode [ 3056.227675][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3056.237983][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3056.248522][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3056.294300][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3056.362180][T10900] bond0 (unregistering): Released all slaves [ 3056.591239][T10900] device hsr_slave_0 left promiscuous mode [ 3056.621129][T10900] device hsr_slave_1 left promiscuous mode [ 3056.677857][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3056.688741][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3056.698656][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3056.764049][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3056.833781][T10900] bond0 (unregistering): Released all slaves [ 3057.021467][T10900] device hsr_slave_0 left promiscuous mode [ 3057.091166][T10900] device hsr_slave_1 left promiscuous mode [ 3057.158072][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3057.168458][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3057.178798][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3057.214577][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3057.272664][T10900] bond0 (unregistering): Released all slaves [ 3057.481454][T10900] device hsr_slave_0 left promiscuous mode [ 3057.521273][T10900] device hsr_slave_1 left promiscuous mode [ 3057.589407][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3057.599866][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3057.611087][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3057.664929][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3057.744092][T10900] bond0 (unregistering): Released all slaves [ 3057.887452][T24497] team0: Port device team_slave_0 added [ 3057.894986][T24497] team0: Port device team_slave_1 added [ 3057.901666][T24496] team0: Port device team_slave_0 added [ 3057.922664][T24496] team0: Port device team_slave_1 added [ 3057.993457][T24497] device hsr_slave_0 entered promiscuous mode [ 3058.041456][T24497] device hsr_slave_1 entered promiscuous mode [ 3058.183445][T24496] device hsr_slave_0 entered promiscuous mode [ 3058.221394][T24496] device hsr_slave_1 entered promiscuous mode [ 3058.271045][T24496] debugfs: Directory 'hsr0' with parent '/' already present! [ 3058.280850][T24501] chnl_net:caif_netlink_parms(): no params data found [ 3058.309665][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3058.318479][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3058.348843][T24501] bridge0: port 1(bridge_slave_0) entered blocking state [ 3058.355998][T24501] bridge0: port 1(bridge_slave_0) entered disabled state [ 3058.364347][T24501] device bridge_slave_0 entered promiscuous mode [ 3058.375361][T24501] bridge0: port 2(bridge_slave_1) entered blocking state [ 3058.382825][T24501] bridge0: port 2(bridge_slave_1) entered disabled state [ 3058.390520][T24501] device bridge_slave_1 entered promiscuous mode [ 3058.415599][T24501] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3058.426613][T24501] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3058.449306][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3058.458201][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3058.472923][T24501] team0: Port device team_slave_0 added [ 3058.478641][T24492] device veth0_vlan entered promiscuous mode [ 3058.487594][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3058.496143][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3058.511076][T24501] team0: Port device team_slave_1 added [ 3058.521612][T24492] device veth1_vlan entered promiscuous mode [ 3058.596000][T24501] device hsr_slave_0 entered promiscuous mode [ 3058.641347][T24501] device hsr_slave_1 entered promiscuous mode [ 3058.680968][T24501] debugfs: Directory 'hsr0' with parent '/' already present! [ 3058.920383][T24497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3059.029087][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3059.051906][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3059.091353][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3059.099361][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3059.136388][T24497] 8021q: adding VLAN 0 to HW filter on device team0 [ 3059.154021][T24496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3059.193411][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3059.211258][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3059.219303][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3059.228528][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3059.237517][T13881] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.244595][T13881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3059.255655][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3059.265083][T24496] 8021q: adding VLAN 0 to HW filter on device team0 [ 3059.278356][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3059.287697][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3059.298629][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.305694][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3059.317037][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3059.337402][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3059.346549][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3059.355800][T13881] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.362864][T13881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3059.370880][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3059.380006][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3059.390054][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3059.398732][T13881] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.405803][T13881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3059.414329][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3059.437100][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3059.446170][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3059.455631][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3059.464257][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3059.473263][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3059.481940][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3059.490811][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3059.499435][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3059.508018][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3059.516414][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3059.525196][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3059.533649][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3059.556235][T24496] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3059.567525][T24496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3059.585682][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3059.594768][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3059.603622][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3059.614087][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3059.623090][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3059.631526][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3059.639766][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3059.648358][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3059.658641][T24497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3059.671444][T24501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3059.691684][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3059.699128][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3059.710039][T24496] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3059.723715][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3059.734691][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3059.747393][T24501] 8021q: adding VLAN 0 to HW filter on device team0 [ 3059.757356][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3059.765383][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3059.776200][T24497] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3059.792105][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3059.803600][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3059.828841][T13881] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.836109][T13881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3059.844383][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3059.853655][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3059.862408][T13881] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.869455][T13881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3059.877796][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3059.913122][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3059.926801][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3059.939906][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3059.950466][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3059.959715][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3059.968972][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3059.978824][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3059.987970][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3059.996691][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3060.005709][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3060.015808][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3060.026627][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3060.036832][T24501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3060.052841][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3060.077790][T24496] device veth0_vlan entered promiscuous mode [ 3060.094488][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3060.103538][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3060.114121][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3060.122306][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3060.136261][T24501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3060.147007][T24496] device veth1_vlan entered promiscuous mode [ 3060.162640][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3060.170769][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3060.178576][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3060.186858][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3060.195848][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3060.217307][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3060.225835][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3060.234719][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3060.244736][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3060.253532][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3060.264748][T24497] device veth0_vlan entered promiscuous mode [ 3060.286158][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3060.295151][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3060.309606][T24501] device veth0_vlan entered promiscuous mode [ 3060.321143][T24501] device veth1_vlan entered promiscuous mode [ 3060.339565][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3060.353970][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3060.373382][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3060.383862][T24497] device veth1_vlan entered promiscuous mode [ 3060.398710][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3060.413820][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3060.422436][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3060.430413][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:02:21 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:21 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:21 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) 16:02:21 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:21 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3060.731026][T10900] tipc: TX() has been purged, node left! 16:02:21 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3061.266332][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:02:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:22 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:22 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:22 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:22 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3062.163024][T10900] device bridge_slave_1 left promiscuous mode [ 3062.169273][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3062.241671][T10900] device bridge_slave_0 left promiscuous mode [ 3062.247988][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3062.323581][T10900] device veth1_vlan left promiscuous mode [ 3062.329372][T10900] device veth0_vlan left promiscuous mode [ 3063.241425][T10900] device hsr_slave_0 left promiscuous mode [ 3063.281069][T10900] device hsr_slave_1 left promiscuous mode [ 3063.341475][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3063.381414][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3063.415360][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3063.485487][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3063.585271][T10900] bond0 (unregistering): Released all slaves [ 3063.715635][T24540] IPVS: ftp: loaded support on port[0] = 21 [ 3063.715643][T24546] IPVS: ftp: loaded support on port[0] = 21 [ 3063.728300][T24549] IPVS: ftp: loaded support on port[0] = 21 [ 3063.736739][T24550] IPVS: ftp: loaded support on port[0] = 21 [ 3063.745573][T24548] IPVS: ftp: loaded support on port[0] = 21 [ 3063.795513][T24547] IPVS: ftp: loaded support on port[0] = 21 [ 3064.029770][T24546] chnl_net:caif_netlink_parms(): no params data found [ 3064.141444][T24549] chnl_net:caif_netlink_parms(): no params data found [ 3064.213283][T24550] chnl_net:caif_netlink_parms(): no params data found [ 3064.232440][T24548] chnl_net:caif_netlink_parms(): no params data found [ 3064.266536][T24547] chnl_net:caif_netlink_parms(): no params data found [ 3064.276515][T24540] chnl_net:caif_netlink_parms(): no params data found [ 3064.302683][T24549] bridge0: port 1(bridge_slave_0) entered blocking state [ 3064.310145][T24549] bridge0: port 1(bridge_slave_0) entered disabled state [ 3064.318471][T24549] device bridge_slave_0 entered promiscuous mode [ 3064.345350][T24546] bridge0: port 1(bridge_slave_0) entered blocking state [ 3064.352644][T24546] bridge0: port 1(bridge_slave_0) entered disabled state [ 3064.360770][T24546] device bridge_slave_0 entered promiscuous mode [ 3064.375116][T24549] bridge0: port 2(bridge_slave_1) entered blocking state [ 3064.382621][T24549] bridge0: port 2(bridge_slave_1) entered disabled state [ 3064.390460][T24549] device bridge_slave_1 entered promiscuous mode [ 3064.415783][T24546] bridge0: port 2(bridge_slave_1) entered blocking state [ 3064.423394][T24546] bridge0: port 2(bridge_slave_1) entered disabled state [ 3064.431829][T24546] device bridge_slave_1 entered promiscuous mode [ 3064.445782][T24550] bridge0: port 1(bridge_slave_0) entered blocking state [ 3064.455018][T24550] bridge0: port 1(bridge_slave_0) entered disabled state [ 3064.464485][T24550] device bridge_slave_0 entered promiscuous mode [ 3064.472429][T24550] bridge0: port 2(bridge_slave_1) entered blocking state [ 3064.479549][T24550] bridge0: port 2(bridge_slave_1) entered disabled state [ 3064.487501][T24550] device bridge_slave_1 entered promiscuous mode [ 3064.538907][T24549] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3064.556079][T24546] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3064.565828][T24547] bridge0: port 1(bridge_slave_0) entered blocking state [ 3064.575631][T24547] bridge0: port 1(bridge_slave_0) entered disabled state [ 3064.584343][T24547] device bridge_slave_0 entered promiscuous mode [ 3064.596034][T24547] bridge0: port 2(bridge_slave_1) entered blocking state [ 3064.603131][T24547] bridge0: port 2(bridge_slave_1) entered disabled state [ 3064.610826][T24547] device bridge_slave_1 entered promiscuous mode [ 3064.628143][T24549] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3064.638760][T24546] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3064.650067][T24550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3064.668738][T24548] bridge0: port 1(bridge_slave_0) entered blocking state [ 3064.676014][T24548] bridge0: port 1(bridge_slave_0) entered disabled state [ 3064.684592][T24548] device bridge_slave_0 entered promiscuous mode [ 3064.692087][T24540] bridge0: port 1(bridge_slave_0) entered blocking state [ 3064.699129][T24540] bridge0: port 1(bridge_slave_0) entered disabled state [ 3064.707029][T24540] device bridge_slave_0 entered promiscuous mode [ 3064.719282][T24540] bridge0: port 2(bridge_slave_1) entered blocking state [ 3064.726463][T24540] bridge0: port 2(bridge_slave_1) entered disabled state [ 3064.734664][T24540] device bridge_slave_1 entered promiscuous mode [ 3064.747289][T24550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3064.758504][T24547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3064.768194][T24548] bridge0: port 2(bridge_slave_1) entered blocking state [ 3064.775418][T24548] bridge0: port 2(bridge_slave_1) entered disabled state [ 3064.783103][T24548] device bridge_slave_1 entered promiscuous mode [ 3064.810871][T24540] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3064.828011][T24547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3064.853314][T24549] team0: Port device team_slave_0 added [ 3064.864922][T24546] team0: Port device team_slave_0 added [ 3064.872321][T24540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3064.892936][T24549] team0: Port device team_slave_1 added [ 3064.899708][T24550] team0: Port device team_slave_0 added [ 3064.907672][T24548] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3064.918377][T24546] team0: Port device team_slave_1 added [ 3064.946731][T24550] team0: Port device team_slave_1 added [ 3064.953944][T24548] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3064.964293][T24540] team0: Port device team_slave_0 added [ 3064.971081][T24547] team0: Port device team_slave_0 added [ 3065.043638][T24549] device hsr_slave_0 entered promiscuous mode [ 3065.091483][T24549] device hsr_slave_1 entered promiscuous mode [ 3065.144395][T24549] debugfs: Directory 'hsr0' with parent '/' already present! [ 3065.153713][T24540] team0: Port device team_slave_1 added [ 3065.160265][T24547] team0: Port device team_slave_1 added [ 3065.213627][T24546] device hsr_slave_0 entered promiscuous mode [ 3065.241629][T24546] device hsr_slave_1 entered promiscuous mode [ 3065.281047][T24546] debugfs: Directory 'hsr0' with parent '/' already present! [ 3065.333061][T24550] device hsr_slave_0 entered promiscuous mode [ 3065.371352][T24550] device hsr_slave_1 entered promiscuous mode [ 3065.411032][T24550] debugfs: Directory 'hsr0' with parent '/' already present! [ 3065.473201][T24547] device hsr_slave_0 entered promiscuous mode [ 3065.511407][T24547] device hsr_slave_1 entered promiscuous mode [ 3065.541124][T24547] debugfs: Directory 'hsr0' with parent '/' already present! [ 3065.549633][T24548] team0: Port device team_slave_0 added [ 3065.612403][T24548] team0: Port device team_slave_1 added [ 3065.673641][T24540] device hsr_slave_0 entered promiscuous mode [ 3065.731508][T24540] device hsr_slave_1 entered promiscuous mode [ 3065.801245][T24540] debugfs: Directory 'hsr0' with parent '/' already present! [ 3065.883682][T24548] device hsr_slave_0 entered promiscuous mode [ 3065.890190][ T45] tipc: TX() has been purged, node left! [ 3065.896929][ T45] tipc: TX() has been purged, node left! [ 3065.902806][ T45] tipc: TX() has been purged, node left! [ 3065.961501][T24548] device hsr_slave_1 entered promiscuous mode [ 3066.011112][T24548] debugfs: Directory 'hsr0' with parent '/' already present! [ 3066.558711][T24549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3066.647221][T24550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3066.756157][T24550] 8021q: adding VLAN 0 to HW filter on device team0 [ 3066.768834][T24547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3066.778194][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3066.786310][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3066.874427][T24549] 8021q: adding VLAN 0 to HW filter on device team0 [ 3066.887344][T24546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3066.895545][ T9779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3066.903571][ T9779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3066.919905][T24547] 8021q: adding VLAN 0 to HW filter on device team0 [ 3066.938685][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3066.947552][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3066.956288][T15792] bridge0: port 1(bridge_slave_0) entered blocking state [ 3066.963395][T15792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3066.971778][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3066.979708][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3066.987588][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3066.996372][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3067.005263][T15792] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.012374][T15792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3067.020237][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3067.029301][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3067.037734][T15792] bridge0: port 2(bridge_slave_1) entered blocking state [ 3067.044941][T15792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3067.054064][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3067.062137][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3067.070171][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3067.078391][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3067.095115][T24548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3067.118307][T24540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3067.199336][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3067.207987][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3067.216647][T15792] bridge0: port 2(bridge_slave_1) entered blocking state [ 3067.223811][T15792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3067.231792][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3067.240519][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3067.249131][T15792] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.256172][T15792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3067.264470][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3067.273887][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3067.282996][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3067.292052][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3067.300823][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3067.309552][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3067.318616][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3067.327499][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3067.336446][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3067.344808][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3067.353232][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3067.367856][ T9779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3067.376840][ T9779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3067.387650][T24546] 8021q: adding VLAN 0 to HW filter on device team0 [ 3067.481831][T24548] 8021q: adding VLAN 0 to HW filter on device team0 [ 3067.500980][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3067.509544][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3067.519220][T23656] bridge0: port 2(bridge_slave_1) entered blocking state [ 3067.526302][T23656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3067.536352][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3067.545101][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3067.554320][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3067.563096][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3067.571887][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3067.579810][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3067.587772][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3067.596317][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3067.604766][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3067.613483][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3067.621971][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3067.630805][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3067.639336][T23656] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.646377][T23656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3067.654668][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3067.663863][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3067.672694][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3067.681483][T23656] bridge0: port 2(bridge_slave_1) entered blocking state [ 3067.688559][T23656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3067.696462][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3067.707287][T24549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3067.728598][T24540] 8021q: adding VLAN 0 to HW filter on device team0 [ 3067.738152][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3067.748061][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3067.756942][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3067.765450][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3067.773793][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3067.783995][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3067.793148][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3067.801943][T23656] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.808969][T23656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3067.817018][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3067.829572][T24550] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3067.841598][T24550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3067.864509][ T45] device bridge_slave_1 left promiscuous mode [ 3067.870767][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3067.901855][ T45] device bridge_slave_0 left promiscuous mode [ 3067.908067][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3067.943798][ T45] device bridge_slave_1 left promiscuous mode [ 3067.949970][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3067.991820][ T45] device bridge_slave_0 left promiscuous mode [ 3067.998024][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3068.044586][ T45] device bridge_slave_1 left promiscuous mode [ 3068.050943][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3068.082299][ T45] device bridge_slave_0 left promiscuous mode [ 3068.088518][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3068.147195][ T45] device veth1_vlan left promiscuous mode [ 3068.153193][ T45] device veth0_vlan left promiscuous mode [ 3068.159018][ T45] device veth1_vlan left promiscuous mode [ 3068.164967][ T45] device veth0_vlan left promiscuous mode [ 3068.170976][ T45] device veth1_vlan left promiscuous mode [ 3068.176703][ T45] device veth0_vlan left promiscuous mode [ 3070.651414][ T45] device hsr_slave_0 left promiscuous mode [ 3070.701022][ T45] device hsr_slave_1 left promiscuous mode [ 3070.777841][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3070.788240][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3070.799072][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3070.844696][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3070.934314][ T45] bond0 (unregistering): Released all slaves [ 3071.121409][ T45] device hsr_slave_0 left promiscuous mode [ 3071.171065][ T45] device hsr_slave_1 left promiscuous mode [ 3071.217148][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3071.228146][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3071.238582][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3071.305093][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3071.363894][ T45] bond0 (unregistering): Released all slaves [ 3071.541475][ T45] device hsr_slave_0 left promiscuous mode [ 3071.581198][ T45] device hsr_slave_1 left promiscuous mode [ 3071.648416][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3071.658758][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3071.668609][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3071.714398][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3071.804197][ T45] bond0 (unregistering): Released all slaves [ 3071.887917][T24549] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3071.896683][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3071.908161][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3071.919791][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3071.931591][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3071.940429][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3071.949252][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3071.957901][ T8066] bridge0: port 2(bridge_slave_1) entered blocking state [ 3071.964958][ T8066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3071.973078][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3071.981784][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3071.990395][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3071.999391][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3072.007689][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3072.016269][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3072.025327][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3072.034122][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3072.042928][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 3072.049969][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3072.057982][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3072.066561][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3072.075164][ T8066] bridge0: port 2(bridge_slave_1) entered blocking state [ 3072.082231][ T8066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3072.090110][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3072.098968][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3072.107906][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3072.116480][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3072.124981][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3072.133513][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3072.142380][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3072.149872][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3072.157859][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3072.178050][T24550] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3072.205563][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3072.219405][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3072.229617][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3072.238861][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3072.247800][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3072.256686][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3072.265376][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3072.273907][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3072.282859][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3072.290409][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3072.298080][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3072.306828][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3072.315795][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3072.324226][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3072.333178][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3072.341735][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3072.350048][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3072.358669][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3072.366968][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3072.375739][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3072.384798][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3072.392769][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3072.402573][T24540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3072.419036][T24546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3072.443867][T24547] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3072.458774][T24547] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3072.472599][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3072.483404][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3072.492046][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3072.500377][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3072.510787][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3072.519674][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3072.528594][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3072.538653][T24548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3072.570324][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3072.585634][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3072.615132][T24540] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3072.636213][T24549] device veth0_vlan entered promiscuous mode [ 3072.643655][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3072.651662][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3072.659046][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3072.666734][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3072.674498][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3072.682044][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3072.689706][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3072.698312][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3072.705862][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3072.714317][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3072.723470][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3072.731573][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3072.748536][T24546] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3072.758287][T24547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3072.776721][T24548] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3072.798557][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3072.815250][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3072.828575][T24549] device veth1_vlan entered promiscuous mode [ 3072.843653][T24550] device veth0_vlan entered promiscuous mode [ 3072.856810][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3072.865752][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3072.875043][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3072.913933][T24550] device veth1_vlan entered promiscuous mode [ 3072.924181][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3072.932365][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3072.940292][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3072.948494][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3073.081391][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3073.090237][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3073.100207][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3073.144943][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3073.189218][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3073.226326][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 16:02:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3073.244770][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3073.254080][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3073.287607][T24540] device veth0_vlan entered promiscuous mode [ 3073.311889][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3073.319872][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3073.367444][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3073.379358][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3073.419088][T24546] device veth0_vlan entered promiscuous mode [ 3073.447955][T24540] device veth1_vlan entered promiscuous mode [ 3073.473690][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3073.491994][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3073.501628][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3073.511346][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3073.519328][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3073.638043][T24547] device veth0_vlan entered promiscuous mode [ 3073.650687][T24548] device veth0_vlan entered promiscuous mode [ 3073.776290][T24546] device veth1_vlan entered promiscuous mode [ 3073.783305][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3073.792020][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3073.800080][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3073.808855][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3073.817960][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3073.826417][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3073.835317][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3073.843446][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3073.851310][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3073.859212][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3073.901611][T24547] device veth1_vlan entered promiscuous mode [ 3073.926567][T24548] device veth1_vlan entered promiscuous mode [ 3073.968391][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3073.992243][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3074.031185][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3074.039640][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 16:02:35 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='mode=00000000000000000000777,mode=00000000000000000000006,mode=00000000000000000000003,mode=00', @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:35 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:35 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:35 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:35 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:36 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:36 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='mode=00000000000000000000777,mode=00000000000000000000006,mode=00000000000000000000003,mode=00', @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:36 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:36 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='mode=00000000000000000000777,mode=00000000000000000000006,mode=00000000000000000000003,mode=00', @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:36 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3075.701153][ T45] tipc: TX() has been purged, node left! [ 3075.881328][ T45] tipc: TX() has been purged, node left! [ 3076.046630][ T45] tipc: TX() has been purged, node left! [ 3076.220974][ T45] tipc: TX() has been purged, node left! [ 3076.380958][ T45] tipc: TX() has been purged, node left! [ 3077.028294][T24640] IPVS: ftp: loaded support on port[0] = 21 [ 3077.197033][T24640] chnl_net:caif_netlink_parms(): no params data found [ 3077.342712][T24640] bridge0: port 1(bridge_slave_0) entered blocking state [ 3077.349976][T24640] bridge0: port 1(bridge_slave_0) entered disabled state [ 3077.358072][T24640] device bridge_slave_0 entered promiscuous mode [ 3077.365769][T24640] bridge0: port 2(bridge_slave_1) entered blocking state [ 3077.373306][T24640] bridge0: port 2(bridge_slave_1) entered disabled state [ 3077.381049][T24640] device bridge_slave_1 entered promiscuous mode [ 3077.672559][T24640] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3077.690010][T24646] IPVS: ftp: loaded support on port[0] = 21 [ 3077.693557][T24648] IPVS: ftp: loaded support on port[0] = 21 [ 3077.709387][T24647] IPVS: ftp: loaded support on port[0] = 21 [ 3077.720780][T24640] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3077.750494][T24640] team0: Port device team_slave_0 added [ 3077.765654][T24649] IPVS: ftp: loaded support on port[0] = 21 [ 3077.903201][T24640] team0: Port device team_slave_1 added [ 3078.103644][T24647] chnl_net:caif_netlink_parms(): no params data found [ 3078.153281][T24640] device hsr_slave_0 entered promiscuous mode [ 3078.191566][T24640] device hsr_slave_1 entered promiscuous mode [ 3078.435187][ T45] device bridge_slave_1 left promiscuous mode [ 3078.441574][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3078.491890][ T45] device bridge_slave_0 left promiscuous mode [ 3078.498144][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3078.554363][ T45] device bridge_slave_1 left promiscuous mode [ 3078.560573][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3078.611748][ T45] device bridge_slave_0 left promiscuous mode [ 3078.617974][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3078.673789][ T45] device bridge_slave_1 left promiscuous mode [ 3078.680020][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3078.731767][ T45] device bridge_slave_0 left promiscuous mode [ 3078.738079][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3078.813992][ T45] device bridge_slave_1 left promiscuous mode [ 3078.820149][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3078.851759][ T45] device bridge_slave_0 left promiscuous mode [ 3078.858081][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3078.903606][ T45] device bridge_slave_1 left promiscuous mode [ 3078.909900][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3078.961826][ T45] device bridge_slave_0 left promiscuous mode [ 3078.968006][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3079.030216][ T45] device veth1_vlan left promiscuous mode [ 3079.036138][ T45] device veth0_vlan left promiscuous mode [ 3079.042114][ T45] device veth1_vlan left promiscuous mode [ 3079.047922][ T45] device veth0_vlan left promiscuous mode [ 3079.053969][ T45] device veth1_vlan left promiscuous mode [ 3079.059719][ T45] device veth0_vlan left promiscuous mode [ 3079.065746][ T45] device veth1_vlan left promiscuous mode [ 3079.071607][ T45] device veth0_vlan left promiscuous mode [ 3079.077598][ T45] device veth1_vlan left promiscuous mode [ 3079.083769][ T45] device veth0_vlan left promiscuous mode [ 3083.131470][ T45] device hsr_slave_0 left promiscuous mode [ 3083.171206][ T45] device hsr_slave_1 left promiscuous mode [ 3083.236916][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3083.246969][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3083.257547][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3083.295819][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3083.373519][ T45] bond0 (unregistering): Released all slaves [ 3083.571367][ T45] device hsr_slave_0 left promiscuous mode [ 3083.631139][ T45] device hsr_slave_1 left promiscuous mode [ 3083.688040][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3083.698256][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3083.708634][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3083.754193][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3083.833500][ T45] bond0 (unregistering): Released all slaves [ 3084.081349][ T45] device hsr_slave_0 left promiscuous mode [ 3084.151021][ T45] device hsr_slave_1 left promiscuous mode [ 3084.236901][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3084.248053][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3084.258796][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3084.304657][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3084.383325][ T45] bond0 (unregistering): Released all slaves [ 3084.591381][ T45] device hsr_slave_0 left promiscuous mode [ 3084.651079][ T45] device hsr_slave_1 left promiscuous mode [ 3084.707407][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3084.717781][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3084.728156][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3084.767511][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3084.824305][ T45] bond0 (unregistering): Released all slaves [ 3085.021468][ T45] device hsr_slave_0 left promiscuous mode [ 3085.061089][ T45] device hsr_slave_1 left promiscuous mode [ 3085.136637][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3085.146910][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3085.157291][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3085.204092][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3085.271788][ T45] bond0 (unregistering): Released all slaves [ 3085.382885][T24647] bridge0: port 1(bridge_slave_0) entered blocking state [ 3085.390768][T24647] bridge0: port 1(bridge_slave_0) entered disabled state [ 3085.398652][T24647] device bridge_slave_0 entered promiscuous mode [ 3085.407839][T24647] bridge0: port 2(bridge_slave_1) entered blocking state [ 3085.415188][T24647] bridge0: port 2(bridge_slave_1) entered disabled state [ 3085.423323][T24647] device bridge_slave_1 entered promiscuous mode [ 3085.476901][T24646] chnl_net:caif_netlink_parms(): no params data found [ 3085.487748][T24647] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3085.502829][T24647] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3085.538470][T24648] chnl_net:caif_netlink_parms(): no params data found [ 3085.561461][T24647] team0: Port device team_slave_0 added [ 3085.593844][T24647] team0: Port device team_slave_1 added [ 3085.624185][T24649] chnl_net:caif_netlink_parms(): no params data found [ 3085.640462][T24648] bridge0: port 1(bridge_slave_0) entered blocking state [ 3085.648151][T24648] bridge0: port 1(bridge_slave_0) entered disabled state [ 3085.656431][T24648] device bridge_slave_0 entered promiscuous mode [ 3085.665476][T24648] bridge0: port 2(bridge_slave_1) entered blocking state [ 3085.673188][T24648] bridge0: port 2(bridge_slave_1) entered disabled state [ 3085.680803][T24648] device bridge_slave_1 entered promiscuous mode [ 3085.692920][T24646] bridge0: port 1(bridge_slave_0) entered blocking state [ 3085.699963][T24646] bridge0: port 1(bridge_slave_0) entered disabled state [ 3085.708648][T24646] device bridge_slave_0 entered promiscuous mode [ 3085.773535][T24647] device hsr_slave_0 entered promiscuous mode [ 3085.811374][T24647] device hsr_slave_1 entered promiscuous mode [ 3085.851055][T24647] debugfs: Directory 'hsr0' with parent '/' already present! [ 3085.862315][T24646] bridge0: port 2(bridge_slave_1) entered blocking state [ 3085.869416][T24646] bridge0: port 2(bridge_slave_1) entered disabled state [ 3085.877342][T24646] device bridge_slave_1 entered promiscuous mode [ 3085.907888][T24649] bridge0: port 1(bridge_slave_0) entered blocking state [ 3085.915006][T24649] bridge0: port 1(bridge_slave_0) entered disabled state [ 3085.923285][T24649] device bridge_slave_0 entered promiscuous mode [ 3085.938906][T24648] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3085.950217][T24648] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3085.962777][T24646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3085.972000][T24649] bridge0: port 2(bridge_slave_1) entered blocking state [ 3085.979070][T24649] bridge0: port 2(bridge_slave_1) entered disabled state [ 3085.987036][T24649] device bridge_slave_1 entered promiscuous mode [ 3086.004489][T24646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3086.024109][T24648] team0: Port device team_slave_0 added [ 3086.035216][T24640] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3086.052762][T24648] team0: Port device team_slave_1 added [ 3086.071935][T24640] 8021q: adding VLAN 0 to HW filter on device team0 [ 3086.080603][T24649] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3086.091881][T24649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3086.113105][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3086.121246][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3086.183774][T24648] device hsr_slave_0 entered promiscuous mode [ 3086.221493][T24648] device hsr_slave_1 entered promiscuous mode [ 3086.271017][T24648] debugfs: Directory 'hsr0' with parent '/' already present! [ 3086.279333][T24646] team0: Port device team_slave_0 added [ 3086.292652][T24646] team0: Port device team_slave_1 added [ 3086.300716][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3086.309495][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3086.317967][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 3086.325085][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3086.334138][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3086.344192][T24649] team0: Port device team_slave_0 added [ 3086.350859][T24649] team0: Port device team_slave_1 added [ 3086.453911][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3086.462993][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3086.474674][T18056] bridge0: port 2(bridge_slave_1) entered blocking state [ 3086.481726][T18056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3086.489709][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3086.499153][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3086.703208][T24646] device hsr_slave_0 entered promiscuous mode [ 3086.741355][T24646] device hsr_slave_1 entered promiscuous mode [ 3086.781008][T24646] debugfs: Directory 'hsr0' with parent '/' already present! [ 3086.852353][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3086.864680][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3086.923490][T24649] device hsr_slave_0 entered promiscuous mode [ 3086.991357][T24649] device hsr_slave_1 entered promiscuous mode [ 3087.050991][T24649] debugfs: Directory 'hsr0' with parent '/' already present! [ 3087.088979][T24640] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3087.100421][T24640] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3087.116311][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3087.125496][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3087.137507][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3087.146575][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3087.158171][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3087.167662][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3087.179398][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3087.188570][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3087.247670][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3087.259050][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3087.269626][T24640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3087.288151][T24647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3087.317070][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3087.325995][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3087.346184][T24647] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.387345][T24648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3087.401849][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3087.410568][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3087.419456][T23656] bridge0: port 1(bridge_slave_0) entered blocking state [ 3087.426545][T23656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3087.434828][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3087.443513][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3087.451895][T23656] bridge0: port 2(bridge_slave_1) entered blocking state [ 3087.459025][T23656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3087.482652][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3087.490747][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3087.501788][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3087.518242][T24648] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.537269][T24649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3087.553235][T24646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3087.562971][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3087.572292][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3087.581829][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3087.590093][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3087.599089][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3087.608336][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3087.617789][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3087.627210][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3087.636389][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3087.645156][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3087.674178][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3087.684120][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3087.693125][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3087.701765][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3087.710416][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3087.719527][T22243] bridge0: port 1(bridge_slave_0) entered blocking state [ 3087.726593][T22243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3087.734558][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3087.742903][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3087.755594][T24647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3087.766906][T24640] device veth0_vlan entered promiscuous mode [ 3087.778808][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3087.801788][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3087.809605][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3087.821890][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3087.830619][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3087.839898][T23656] bridge0: port 2(bridge_slave_1) entered blocking state [ 3087.846963][T23656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3087.855508][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3087.877898][T24649] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.890805][T24646] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.914432][T24640] device veth1_vlan entered promiscuous mode [ 3087.923988][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3087.932582][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3087.940494][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3087.949021][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3087.958174][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3087.966419][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3087.975380][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3087.984123][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3087.993057][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3088.001773][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3088.010361][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3088.019287][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3088.028494][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3088.036899][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3088.044678][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3088.066998][T24648] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3088.078325][T24648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3088.091516][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3088.100864][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3088.109880][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3088.118430][T11142] bridge0: port 1(bridge_slave_0) entered blocking state [ 3088.125488][T11142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3088.134075][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3088.142879][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3088.151567][T11142] bridge0: port 1(bridge_slave_0) entered blocking state [ 3088.158605][T11142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3088.166525][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3088.175150][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3088.184064][T11142] bridge0: port 2(bridge_slave_1) entered blocking state [ 3088.191168][T11142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3088.198954][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3088.208183][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3088.216849][T11142] bridge0: port 2(bridge_slave_1) entered blocking state [ 3088.223911][T11142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3088.232151][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3088.241452][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3088.250065][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3088.258806][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3088.268362][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3088.277884][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3088.286274][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3088.300495][T24647] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3088.336981][T24649] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3088.348828][T24649] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3088.365972][T24646] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3088.376892][T24646] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3088.388552][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3088.397293][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3088.406048][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3088.414645][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3088.423601][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3088.432339][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3088.441116][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3088.449650][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3088.458180][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3088.468857][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3088.477749][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3088.486341][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3088.495190][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3088.503955][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3088.512452][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3088.521262][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3088.529896][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3088.539089][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3088.547487][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3088.555349][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3088.564118][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3088.594845][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3088.602867][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3088.618588][T24649] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3088.633848][T24646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3088.655878][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3088.665781][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3088.684784][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3088.707877][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3088.723918][T24648] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3088.800118][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3088.817201][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3088.839935][T24647] device veth0_vlan entered promiscuous mode [ 3088.854185][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3088.863475][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3088.880589][T24647] device veth1_vlan entered promiscuous mode 16:02:49 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3088.905795][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3088.917396][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3088.926023][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3088.934768][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3088.944204][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3088.953945][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3088.963221][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3088.989715][T24649] device veth0_vlan entered promiscuous mode [ 3089.001123][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3089.009813][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3089.034168][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3089.043218][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3089.053557][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3089.063115][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3089.081101][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3089.088949][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3089.121656][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3089.138510][T24646] device veth0_vlan entered promiscuous mode [ 3089.154221][T24649] device veth1_vlan entered promiscuous mode [ 3089.164638][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3089.191925][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3089.200757][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3089.249708][T24648] device veth0_vlan entered promiscuous mode [ 3089.268850][T24646] device veth1_vlan entered promiscuous mode [ 3089.336502][T24696] bpf: Bad value for 'mode' [ 3089.368724][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3089.381539][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3089.390081][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3089.402126][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3089.415745][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3089.423776][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3089.440839][T24648] device veth1_vlan entered promiscuous mode [ 3089.481633][T10900] tipc: TX() has been purged, node left! 16:02:50 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:50 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:50 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3089.797490][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3089.806906][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3089.819544][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:02:50 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:51 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:51 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:51 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:52 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:52 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3092.213534][T10900] device bridge_slave_1 left promiscuous mode [ 3092.219827][T10900] bridge0: port 2(bridge_slave_1) entered disabled state [ 3092.291483][T10900] device bridge_slave_0 left promiscuous mode [ 3092.297712][T10900] bridge0: port 1(bridge_slave_0) entered disabled state [ 3092.384141][T10900] device veth1_vlan left promiscuous mode [ 3092.389980][T10900] device veth0_vlan left promiscuous mode [ 3093.321729][T10900] device hsr_slave_0 left promiscuous mode [ 3093.373954][T10900] device hsr_slave_1 left promiscuous mode [ 3093.422182][T10900] team0 (unregistering): Port device team_slave_1 removed [ 3093.437256][T10900] team0 (unregistering): Port device team_slave_0 removed [ 3093.447815][T10900] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3093.484525][T10900] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3093.565479][T10900] bond0 (unregistering): Released all slaves [ 3093.677431][T24764] IPVS: ftp: loaded support on port[0] = 21 [ 3093.677792][T24766] IPVS: ftp: loaded support on port[0] = 21 [ 3093.788353][T24764] chnl_net:caif_netlink_parms(): no params data found [ 3093.862272][T24766] chnl_net:caif_netlink_parms(): no params data found [ 3093.894814][T24764] bridge0: port 1(bridge_slave_0) entered blocking state [ 3093.902066][T24764] bridge0: port 1(bridge_slave_0) entered disabled state [ 3093.909954][T24764] device bridge_slave_0 entered promiscuous mode [ 3093.930714][T24766] bridge0: port 1(bridge_slave_0) entered blocking state [ 3093.938250][T24766] bridge0: port 1(bridge_slave_0) entered disabled state [ 3093.946768][T24766] device bridge_slave_0 entered promiscuous mode [ 3093.954621][T24764] bridge0: port 2(bridge_slave_1) entered blocking state [ 3093.962751][T24764] bridge0: port 2(bridge_slave_1) entered disabled state [ 3093.970854][T24764] device bridge_slave_1 entered promiscuous mode [ 3093.978593][T24766] bridge0: port 2(bridge_slave_1) entered blocking state [ 3093.986289][T24766] bridge0: port 2(bridge_slave_1) entered disabled state [ 3093.994536][T24766] device bridge_slave_1 entered promiscuous mode [ 3094.023136][T24764] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3094.034922][T24766] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3094.046461][T24764] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3094.057820][T24766] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3094.079345][T24764] team0: Port device team_slave_0 added [ 3094.097475][T24766] team0: Port device team_slave_0 added [ 3094.106227][T24764] team0: Port device team_slave_1 added [ 3094.125127][T24766] team0: Port device team_slave_1 added [ 3094.193472][T24764] device hsr_slave_0 entered promiscuous mode [ 3094.231232][T24764] device hsr_slave_1 entered promiscuous mode [ 3094.333464][T24766] device hsr_slave_0 entered promiscuous mode [ 3094.371501][T24766] device hsr_slave_1 entered promiscuous mode [ 3094.431074][T24766] debugfs: Directory 'hsr0' with parent '/' already present! [ 3094.487180][T24764] bridge0: port 2(bridge_slave_1) entered blocking state [ 3094.494264][T24764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3094.501527][T24764] bridge0: port 1(bridge_slave_0) entered blocking state [ 3094.508623][T24764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3094.537462][T24766] bridge0: port 2(bridge_slave_1) entered blocking state [ 3094.544600][T24766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3094.552100][T24766] bridge0: port 1(bridge_slave_0) entered blocking state [ 3094.559154][T24766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3094.597007][T24764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3094.611455][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3094.619641][T22244] bridge0: port 1(bridge_slave_0) entered disabled state [ 3094.627994][T22244] bridge0: port 2(bridge_slave_1) entered disabled state [ 3094.636613][T22244] bridge0: port 1(bridge_slave_0) entered disabled state [ 3094.645101][T22244] bridge0: port 2(bridge_slave_1) entered disabled state [ 3094.661665][T24764] 8021q: adding VLAN 0 to HW filter on device team0 [ 3094.675295][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3094.684261][T22244] bridge0: port 1(bridge_slave_0) entered blocking state [ 3094.691323][T22244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3094.715992][T24766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3094.723768][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3094.732592][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3094.741140][ T8055] bridge0: port 2(bridge_slave_1) entered blocking state [ 3094.748163][ T8055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3094.756253][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3094.765146][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3094.781744][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3094.790484][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3094.802082][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3094.810663][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3094.822732][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3094.831199][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3094.839498][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3094.850792][T24764] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3094.862583][T24764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3094.876243][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3094.884824][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3094.898088][T24766] 8021q: adding VLAN 0 to HW filter on device team0 [ 3094.907185][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3094.915701][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3094.930770][T24764] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3094.943214][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3094.950750][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3094.969801][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3094.985588][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3094.994330][T23321] bridge0: port 1(bridge_slave_0) entered blocking state [ 3095.001422][T23321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3095.009976][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3095.019029][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3095.027748][T23321] bridge0: port 2(bridge_slave_1) entered blocking state [ 3095.035168][T23321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3095.053593][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3095.063683][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3095.076440][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3095.086733][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3095.099564][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3095.108272][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3095.119588][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3095.136702][ T9164] tipc: TX() has been purged, node left! [ 3095.139633][T24766] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3095.153554][T24766] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3095.164673][ T9164] tipc: TX() has been purged, node left! [ 3095.170568][ T9164] tipc: TX() has been purged, node left! [ 3095.176851][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3095.185467][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3095.194184][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3095.202644][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3095.211174][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3095.242203][T24766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3095.249450][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3095.259317][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3095.268949][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3095.276892][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3095.284468][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3095.292963][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3095.302340][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3095.310235][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3095.470330][T24764] device veth0_vlan entered promiscuous mode [ 3095.487558][T24764] device veth1_vlan entered promiscuous mode [ 3095.507194][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3095.517172][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3095.525977][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3095.550695][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3095.663776][T24766] device veth0_vlan entered promiscuous mode [ 3095.670640][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3095.680384][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 16:02:56 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:56 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:56 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:56 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:02:56 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3096.065744][T24766] device veth1_vlan entered promiscuous mode [ 3096.115992][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3096.161721][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3096.169868][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 16:02:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:57 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:58 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:58 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:58 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:58 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:02:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3098.587987][ T9164] device bridge_slave_1 left promiscuous mode [ 3098.594696][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3098.644776][ T9164] device bridge_slave_0 left promiscuous mode [ 3098.651222][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3098.710414][ T9164] device bridge_slave_1 left promiscuous mode [ 3098.716719][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3098.781596][ T9164] device bridge_slave_0 left promiscuous mode [ 3098.791196][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3098.844431][ T9164] device bridge_slave_1 left promiscuous mode [ 3098.850793][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3098.901715][ T9164] device bridge_slave_0 left promiscuous mode [ 3098.908047][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3098.967076][ T9164] device veth1_vlan left promiscuous mode [ 3098.972932][ T9164] device veth0_vlan left promiscuous mode [ 3098.978834][ T9164] device veth1_vlan left promiscuous mode [ 3098.984602][ T9164] device veth0_vlan left promiscuous mode [ 3098.990695][ T9164] device veth1_vlan left promiscuous mode [ 3098.996503][ T9164] device veth0_vlan left promiscuous mode [ 3101.451385][ T9164] device hsr_slave_0 left promiscuous mode [ 3101.491102][ T9164] device hsr_slave_1 left promiscuous mode [ 3101.567756][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3101.578481][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3101.588864][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3101.654912][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3101.745546][ T9164] bond0 (unregistering): Released all slaves [ 3101.981374][ T9164] device hsr_slave_0 left promiscuous mode [ 3102.051027][ T9164] device hsr_slave_1 left promiscuous mode [ 3102.107361][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3102.118412][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3102.128628][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3102.175335][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3102.254492][ T9164] bond0 (unregistering): Released all slaves [ 3102.491349][ T9164] device hsr_slave_0 left promiscuous mode [ 3102.551054][ T9164] device hsr_slave_1 left promiscuous mode [ 3102.597593][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3102.607905][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3102.618210][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3102.655100][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3102.735768][ T9164] bond0 (unregistering): Released all slaves [ 3102.859181][T24856] IPVS: ftp: loaded support on port[0] = 21 [ 3102.872750][T24858] IPVS: ftp: loaded support on port[0] = 21 [ 3102.961591][T24856] chnl_net:caif_netlink_parms(): no params data found [ 3103.014697][T24858] chnl_net:caif_netlink_parms(): no params data found [ 3103.025984][T24856] bridge0: port 1(bridge_slave_0) entered blocking state [ 3103.033707][T24856] bridge0: port 1(bridge_slave_0) entered disabled state [ 3103.041988][T24856] device bridge_slave_0 entered promiscuous mode [ 3103.049737][T24856] bridge0: port 2(bridge_slave_1) entered blocking state [ 3103.056867][T24856] bridge0: port 2(bridge_slave_1) entered disabled state [ 3103.064752][T24856] device bridge_slave_1 entered promiscuous mode [ 3103.096680][T24856] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3103.113922][T24856] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3103.134373][T24858] bridge0: port 1(bridge_slave_0) entered blocking state [ 3103.141555][T24858] bridge0: port 1(bridge_slave_0) entered disabled state [ 3103.149585][T24858] device bridge_slave_0 entered promiscuous mode [ 3103.162337][T24858] bridge0: port 2(bridge_slave_1) entered blocking state [ 3103.169437][T24858] bridge0: port 2(bridge_slave_1) entered disabled state [ 3103.178026][T24858] device bridge_slave_1 entered promiscuous mode [ 3103.185697][T24856] team0: Port device team_slave_0 added [ 3103.192803][T24856] team0: Port device team_slave_1 added [ 3103.353136][T24858] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3103.413394][T24856] device hsr_slave_0 entered promiscuous mode [ 3103.441334][T24856] device hsr_slave_1 entered promiscuous mode [ 3103.480958][T24856] debugfs: Directory 'hsr0' with parent '/' already present! [ 3103.490060][T24858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3103.534406][T24858] team0: Port device team_slave_0 added [ 3103.545854][T24856] bridge0: port 2(bridge_slave_1) entered blocking state [ 3103.552964][T24856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3103.560258][T24856] bridge0: port 1(bridge_slave_0) entered blocking state [ 3103.567301][T24856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3103.581304][T24858] team0: Port device team_slave_1 added [ 3103.663710][T24858] device hsr_slave_0 entered promiscuous mode [ 3103.701242][T24858] device hsr_slave_1 entered promiscuous mode [ 3103.761042][T24858] debugfs: Directory 'hsr0' with parent '/' already present! [ 3103.799996][T24856] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3103.815106][T24858] bridge0: port 2(bridge_slave_1) entered blocking state [ 3103.822194][T24858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3103.829495][T24858] bridge0: port 1(bridge_slave_0) entered blocking state [ 3103.836547][T24858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3103.862831][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3103.872261][ T8055] bridge0: port 1(bridge_slave_0) entered disabled state [ 3103.880651][ T8055] bridge0: port 2(bridge_slave_1) entered disabled state [ 3103.891492][ T8055] bridge0: port 1(bridge_slave_0) entered disabled state [ 3103.900563][ T8055] bridge0: port 2(bridge_slave_1) entered disabled state [ 3103.915490][T24856] 8021q: adding VLAN 0 to HW filter on device team0 [ 3103.934940][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3103.944197][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3103.952717][ T8055] bridge0: port 1(bridge_slave_0) entered blocking state [ 3103.959825][ T8055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3103.975362][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3103.984179][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3103.996437][T23656] bridge0: port 2(bridge_slave_1) entered blocking state [ 3104.003569][T23656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3104.022446][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3104.042196][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3104.067428][T24858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3104.074767][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3104.084163][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3104.093737][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3104.106224][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3104.115535][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3104.129152][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3104.137700][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3104.146200][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3104.154790][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3104.169987][T24858] 8021q: adding VLAN 0 to HW filter on device team0 [ 3104.177973][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3104.186289][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3104.195169][T24856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3104.211454][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3104.220287][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3104.229133][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3104.236211][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3104.251164][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3104.259795][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3104.268648][ T8066] bridge0: port 2(bridge_slave_1) entered blocking state [ 3104.275721][ T8066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3104.283933][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3104.292973][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3104.308282][T24856] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3104.316878][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3104.325012][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3104.342966][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3104.353298][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3104.363087][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3104.372220][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3104.381441][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3104.390017][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3104.398828][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3104.412685][T24858] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3104.426913][T24858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3104.441092][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3104.449525][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3104.466041][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3104.481398][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3104.491673][T24858] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3104.508186][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3104.517092][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3104.537377][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3104.545981][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3104.557388][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3104.565913][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3104.575181][T24856] device veth0_vlan entered promiscuous mode [ 3104.586866][T24856] device veth1_vlan entered promiscuous mode [ 3104.604941][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3104.614092][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3104.623303][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3104.632352][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3104.669816][ T9164] tipc: TX() has been purged, node left! [ 3104.677182][T24858] device veth0_vlan entered promiscuous mode [ 3104.685600][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3104.695966][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3104.710685][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3104.720799][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3104.733327][T24858] device veth1_vlan entered promiscuous mode [ 3104.916652][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3104.938601][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:03:06 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:06 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:06 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:06 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:06 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:06 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:06 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:06 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='mode=00000000000000000000777,mode=00000000000000000000006,mode=', @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:06 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) 16:03:06 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:07 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) 16:03:07 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:07 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:07 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:07 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:07 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3107.286238][ T9164] device bridge_slave_1 left promiscuous mode [ 3107.306093][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3107.371542][ T9164] device bridge_slave_0 left promiscuous mode [ 3107.382978][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3107.423395][ T9164] device veth1_vlan left promiscuous mode [ 3107.429408][ T9164] device veth0_vlan left promiscuous mode [ 3108.321391][ T9164] device hsr_slave_0 left promiscuous mode [ 3108.361120][ T9164] device hsr_slave_1 left promiscuous mode [ 3108.420254][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3108.435144][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3108.450036][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3108.505139][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3108.576156][ T9164] bond0 (unregistering): Released all slaves [ 3108.659031][T24952] IPVS: ftp: loaded support on port[0] = 21 [ 3108.718666][T24952] chnl_net:caif_netlink_parms(): no params data found [ 3108.747606][T24952] bridge0: port 1(bridge_slave_0) entered blocking state [ 3108.754810][T24952] bridge0: port 1(bridge_slave_0) entered disabled state [ 3108.762766][T24952] device bridge_slave_0 entered promiscuous mode [ 3108.770294][T24952] bridge0: port 2(bridge_slave_1) entered blocking state [ 3108.777859][T24952] bridge0: port 2(bridge_slave_1) entered disabled state [ 3108.785539][T24952] device bridge_slave_1 entered promiscuous mode [ 3108.802737][T24952] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3108.892623][T24952] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3108.913912][T24952] team0: Port device team_slave_0 added [ 3108.920765][T24952] team0: Port device team_slave_1 added [ 3108.973141][T24952] device hsr_slave_0 entered promiscuous mode [ 3109.014476][T24952] device hsr_slave_1 entered promiscuous mode [ 3109.050981][T24952] debugfs: Directory 'hsr0' with parent '/' already present! [ 3109.086335][T24952] bridge0: port 2(bridge_slave_1) entered blocking state [ 3109.093429][T24952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3109.100824][T24952] bridge0: port 1(bridge_slave_0) entered blocking state [ 3109.108025][T24952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3109.152975][T24952] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3109.166003][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3109.177904][ T9981] bridge0: port 1(bridge_slave_0) entered disabled state [ 3109.186277][ T9981] bridge0: port 2(bridge_slave_1) entered disabled state [ 3109.203768][T24952] 8021q: adding VLAN 0 to HW filter on device team0 [ 3109.216111][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3109.224925][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3109.231980][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3109.252255][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3109.262053][T23321] bridge0: port 2(bridge_slave_1) entered blocking state [ 3109.269179][T23321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3109.278512][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3109.297798][T24952] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3109.309004][T24952] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3109.323240][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3109.332206][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3109.341575][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3109.350321][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3109.359776][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3109.376669][T24952] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3109.384893][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3109.392740][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3109.441577][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3109.456196][T24952] device veth0_vlan entered promiscuous mode [ 3109.465099][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3109.478059][T24952] device veth1_vlan entered promiscuous mode [ 3109.486146][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3109.494949][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3109.503533][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 16:03:10 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:10 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='mode=00000000000000000000777,mode=00000000000000000000006,mode=', @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:10 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:10 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:10 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3109.661578][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:03:10 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 3109.820329][ T9164] tipc: TX() has been purged, node left! [ 3109.831065][ T9164] tipc: TX() has been purged, node left! [ 3109.871224][ T9164] tipc: TX() has been purged, node left! 16:03:11 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:11 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:11 executing program 0: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:11 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:11 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3112.254640][ T9164] device bridge_slave_1 left promiscuous mode [ 3112.261105][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3112.331615][ T9164] device bridge_slave_0 left promiscuous mode [ 3112.337916][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3112.384337][ T9164] device bridge_slave_1 left promiscuous mode [ 3112.390778][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3112.451494][ T9164] device bridge_slave_0 left promiscuous mode [ 3112.457708][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3112.514082][ T9164] device bridge_slave_1 left promiscuous mode [ 3112.520433][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3112.571688][ T9164] device bridge_slave_0 left promiscuous mode [ 3112.577919][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3112.646456][ T9164] device veth1_vlan left promiscuous mode [ 3112.652658][ T9164] device veth0_vlan left promiscuous mode [ 3112.658635][ T9164] device veth1_vlan left promiscuous mode [ 3112.664435][ T9164] device veth0_vlan left promiscuous mode [ 3112.670336][ T9164] device veth1_vlan left promiscuous mode [ 3112.676160][ T9164] device veth0_vlan left promiscuous mode [ 3115.201383][ T9164] device hsr_slave_0 left promiscuous mode [ 3115.271215][ T9164] device hsr_slave_1 left promiscuous mode [ 3115.317986][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3115.328722][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3115.339304][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3115.374969][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3115.464024][ T9164] bond0 (unregistering): Released all slaves [ 3115.691468][ T9164] device hsr_slave_0 left promiscuous mode [ 3115.741089][ T9164] device hsr_slave_1 left promiscuous mode [ 3115.797881][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3115.808143][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3115.818437][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3115.874721][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3115.954563][ T9164] bond0 (unregistering): Released all slaves [ 3116.141479][ T9164] device hsr_slave_0 left promiscuous mode [ 3116.181065][ T9164] device hsr_slave_1 left promiscuous mode [ 3116.257170][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3116.267663][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3116.277689][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3116.315023][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3116.393833][ T9164] bond0 (unregistering): Released all slaves [ 3116.479729][T25001] IPVS: ftp: loaded support on port[0] = 21 [ 3116.480054][T24997] IPVS: ftp: loaded support on port[0] = 21 [ 3116.497672][T25003] IPVS: ftp: loaded support on port[0] = 21 [ 3116.504311][T25002] IPVS: ftp: loaded support on port[0] = 21 [ 3116.581503][T24997] chnl_net:caif_netlink_parms(): no params data found [ 3116.649621][T24997] bridge0: port 1(bridge_slave_0) entered blocking state [ 3116.656774][T24997] bridge0: port 1(bridge_slave_0) entered disabled state [ 3116.664835][T24997] device bridge_slave_0 entered promiscuous mode [ 3116.695942][T24997] bridge0: port 2(bridge_slave_1) entered blocking state [ 3116.703510][T24997] bridge0: port 2(bridge_slave_1) entered disabled state [ 3116.711543][T24997] device bridge_slave_1 entered promiscuous mode [ 3116.750243][T25001] chnl_net:caif_netlink_parms(): no params data found [ 3116.761442][T24997] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3116.800713][T24997] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3116.814808][T25003] chnl_net:caif_netlink_parms(): no params data found [ 3116.863116][T24997] team0: Port device team_slave_0 added [ 3116.884405][T24997] team0: Port device team_slave_1 added [ 3116.895446][T25002] chnl_net:caif_netlink_parms(): no params data found [ 3116.904674][T25001] bridge0: port 1(bridge_slave_0) entered blocking state [ 3116.912053][T25001] bridge0: port 1(bridge_slave_0) entered disabled state [ 3116.919812][T25001] device bridge_slave_0 entered promiscuous mode [ 3116.928417][T25001] bridge0: port 2(bridge_slave_1) entered blocking state [ 3116.935672][T25001] bridge0: port 2(bridge_slave_1) entered disabled state [ 3116.943420][T25001] device bridge_slave_1 entered promiscuous mode [ 3116.958260][T25003] bridge0: port 1(bridge_slave_0) entered blocking state [ 3116.965592][T25003] bridge0: port 1(bridge_slave_0) entered disabled state [ 3116.973582][T25003] device bridge_slave_0 entered promiscuous mode [ 3117.004248][T25003] bridge0: port 2(bridge_slave_1) entered blocking state [ 3117.011611][T25003] bridge0: port 2(bridge_slave_1) entered disabled state [ 3117.019484][T25003] device bridge_slave_1 entered promiscuous mode [ 3117.163308][T24997] device hsr_slave_0 entered promiscuous mode [ 3117.201371][T24997] device hsr_slave_1 entered promiscuous mode [ 3117.253112][T25001] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3117.328778][T25001] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3117.351623][T25003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3117.365357][T25002] bridge0: port 1(bridge_slave_0) entered blocking state [ 3117.380987][T25002] bridge0: port 1(bridge_slave_0) entered disabled state [ 3117.388667][T25002] device bridge_slave_0 entered promiscuous mode [ 3117.407518][T25003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3117.421093][T25002] bridge0: port 2(bridge_slave_1) entered blocking state [ 3117.428223][T25002] bridge0: port 2(bridge_slave_1) entered disabled state [ 3117.439502][T25002] device bridge_slave_1 entered promiscuous mode [ 3117.449952][T25001] team0: Port device team_slave_0 added [ 3117.473816][T25001] team0: Port device team_slave_1 added [ 3117.524313][T25003] team0: Port device team_slave_0 added [ 3117.532052][T25002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3117.554678][T25002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3117.581947][T25003] team0: Port device team_slave_1 added [ 3117.613378][T25001] device hsr_slave_0 entered promiscuous mode [ 3117.651300][T25001] device hsr_slave_1 entered promiscuous mode [ 3117.690954][T25001] debugfs: Directory 'hsr0' with parent '/' already present! [ 3117.756973][T25002] team0: Port device team_slave_0 added [ 3117.813436][T25003] device hsr_slave_0 entered promiscuous mode [ 3117.851434][T25003] device hsr_slave_1 entered promiscuous mode [ 3117.891104][T25003] debugfs: Directory 'hsr0' with parent '/' already present! [ 3117.912461][T25002] team0: Port device team_slave_1 added [ 3117.967499][T24997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3118.053911][T25002] device hsr_slave_0 entered promiscuous mode [ 3118.111434][T25002] device hsr_slave_1 entered promiscuous mode [ 3118.151058][T25002] debugfs: Directory 'hsr0' with parent '/' already present! [ 3118.200103][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3118.208349][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3118.243678][T24997] 8021q: adding VLAN 0 to HW filter on device team0 [ 3118.259174][T25001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3118.278002][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3118.287534][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3118.296343][T23656] bridge0: port 1(bridge_slave_0) entered blocking state [ 3118.303420][T23656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3118.319043][T25001] 8021q: adding VLAN 0 to HW filter on device team0 [ 3118.342333][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3118.350463][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3118.370806][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3118.379259][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3118.388199][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3118.396696][ T8055] bridge0: port 2(bridge_slave_1) entered blocking state [ 3118.403842][ T8055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3118.411977][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3118.420566][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3118.429082][ T8055] bridge0: port 1(bridge_slave_0) entered blocking state [ 3118.436137][ T8055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3118.444272][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3118.452911][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3118.461322][ T8055] bridge0: port 2(bridge_slave_1) entered blocking state [ 3118.468619][ T8055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3118.476575][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3118.485673][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3118.496815][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3118.505198][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3118.529244][T25003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3118.537635][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3118.549618][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3118.560054][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3118.572958][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3118.584501][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3118.614185][T25003] 8021q: adding VLAN 0 to HW filter on device team0 [ 3118.633413][T25001] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3118.644144][T25001] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3118.656943][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3118.665977][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3118.674473][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3118.683686][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3118.692531][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3118.701358][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3118.709090][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3118.717124][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3118.738510][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3118.747586][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3118.756621][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3118.766405][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3118.775662][T15626] bridge0: port 1(bridge_slave_0) entered blocking state [ 3118.782742][T15626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3118.791196][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3118.799887][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3118.809019][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3118.817520][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3118.826198][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3118.834772][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3118.843900][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3118.852810][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3118.861602][T15626] bridge0: port 2(bridge_slave_1) entered blocking state [ 3118.868716][T15626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3118.876959][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3118.886451][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3118.900679][T24997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3118.920162][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3118.928162][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3118.941521][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3118.950830][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3118.961021][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3118.969834][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3118.979283][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3118.992367][T25001] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3119.015735][T25003] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3119.036932][T25003] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3119.050619][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3119.059671][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3119.068688][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3119.077161][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3119.085853][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3119.094731][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3119.103417][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3119.120211][T24997] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3119.141002][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3119.148497][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3119.174536][T25002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3119.195803][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3119.203790][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3119.213437][T25003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3119.230999][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3119.239904][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3119.265796][T25002] 8021q: adding VLAN 0 to HW filter on device team0 [ 3119.273089][ T9164] tipc: TX() has been purged, node left! [ 3119.277509][T25001] device veth0_vlan entered promiscuous mode [ 3119.287134][ T9164] tipc: TX() has been purged, node left! [ 3119.296891][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3119.305204][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3119.313442][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3119.322413][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3119.330816][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3119.339737][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3119.355351][T25001] device veth1_vlan entered promiscuous mode [ 3119.368890][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3119.377244][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3119.386043][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3119.394706][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3119.403965][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3119.415757][T15626] bridge0: port 1(bridge_slave_0) entered blocking state [ 3119.423722][T15626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3119.432206][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3119.441139][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3119.449687][T15626] bridge0: port 2(bridge_slave_1) entered blocking state [ 3119.456835][T15626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3119.478543][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3119.487388][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3119.495849][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3119.504966][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3119.514600][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3119.523459][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3119.677013][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3119.692008][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3119.700415][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3119.715262][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3119.724500][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3119.739153][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3119.748091][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3119.759799][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3119.767871][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3119.780035][T25002] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3119.792093][T25002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3119.803963][T24997] device veth0_vlan entered promiscuous mode [ 3119.812481][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3119.821323][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3119.954214][T24997] device veth1_vlan entered promiscuous mode [ 3119.965670][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3119.973665][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3119.993045][T25002] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3120.090590][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3120.099418][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3120.108226][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3120.117077][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3120.243926][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3120.254503][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3120.290995][T25003] device veth0_vlan entered promiscuous mode [ 3120.419570][T25003] device veth1_vlan entered promiscuous mode [ 3120.438964][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3120.450214][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3120.459254][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3120.529637][T25002] device veth0_vlan entered promiscuous mode [ 3120.540866][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3120.549969][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3120.558579][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3120.633988][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3120.646717][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3120.656009][T25002] device veth1_vlan entered promiscuous mode [ 3120.726448][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3120.735135][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3120.840082][T25051] bpf: Bad value for 'mode' 16:03:21 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYBLOB=',obj_user=\\,uid', @ANYRESDEC=r6, @ANYBLOB=',\x00']) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x2, {0x2003b, 0x200, 0x7d, 0x1}}) 16:03:21 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:21 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYBLOB=',obj_user=\\,uid', @ANYRESDEC=r6, @ANYBLOB=',\x00']) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x2, {0x2003b, 0x200, 0x7d, 0x1}}) 16:03:21 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:21 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3121.020750][ T9164] device bridge_slave_1 left promiscuous mode [ 3121.056577][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3121.131790][ T9164] device bridge_slave_0 left promiscuous mode [ 3121.138030][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3121.228951][ T9164] device bridge_slave_1 left promiscuous mode [ 3121.242149][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3121.325300][ T9164] device bridge_slave_0 left promiscuous mode [ 3121.332702][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state 16:03:22 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:22 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3121.435522][ T9164] device veth1_vlan left promiscuous mode [ 3121.445567][ T9164] device veth0_vlan left promiscuous mode [ 3121.460801][ T9164] device veth1_vlan left promiscuous mode [ 3121.481837][ T9164] device veth0_vlan left promiscuous mode 16:03:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) 16:03:22 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:22 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:23 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3124.751392][ T9164] device hsr_slave_0 left promiscuous mode [ 3124.781072][ T9164] device hsr_slave_1 left promiscuous mode [ 3124.837875][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3124.848966][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3124.859642][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3124.924611][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3125.004954][ T9164] bond0 (unregistering): Released all slaves [ 3125.221298][ T9164] device hsr_slave_0 left promiscuous mode [ 3125.261537][ T9164] device hsr_slave_1 left promiscuous mode [ 3125.328485][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3125.339327][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3125.349720][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3125.385321][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3125.484158][ T9164] bond0 (unregistering): Released all slaves 16:03:26 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYBLOB=',obj_user=\\,uid', @ANYRESDEC=r6, @ANYBLOB=',\x00']) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x2, {0x2003b, 0x200, 0x7d, 0x1}}) 16:03:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3125.714698][T25106] IPVS: ftp: loaded support on port[0] = 21 [ 3125.714930][T25108] IPVS: ftp: loaded support on port[0] = 21 [ 3126.052178][T25108] chnl_net:caif_netlink_parms(): no params data found [ 3126.114315][T25106] chnl_net:caif_netlink_parms(): no params data found [ 3126.123856][T25108] bridge0: port 1(bridge_slave_0) entered blocking state [ 3126.131435][T25108] bridge0: port 1(bridge_slave_0) entered disabled state [ 3126.139225][T25108] device bridge_slave_0 entered promiscuous mode [ 3126.164893][T25108] bridge0: port 2(bridge_slave_1) entered blocking state [ 3126.172163][T25108] bridge0: port 2(bridge_slave_1) entered disabled state [ 3126.180112][T25108] device bridge_slave_1 entered promiscuous mode [ 3126.193091][T25106] bridge0: port 1(bridge_slave_0) entered blocking state [ 3126.200172][T25106] bridge0: port 1(bridge_slave_0) entered disabled state [ 3126.208765][T25106] device bridge_slave_0 entered promiscuous mode [ 3126.228490][T25108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3126.237776][T25106] bridge0: port 2(bridge_slave_1) entered blocking state [ 3126.250968][T25106] bridge0: port 2(bridge_slave_1) entered disabled state [ 3126.258946][T25106] device bridge_slave_1 entered promiscuous mode [ 3126.267999][T25108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3126.289001][T25106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3126.309346][T25108] team0: Port device team_slave_0 added [ 3126.317199][T25106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3126.346949][T25108] team0: Port device team_slave_1 added [ 3126.359064][T25106] team0: Port device team_slave_0 added [ 3126.372410][T25106] team0: Port device team_slave_1 added [ 3126.447241][T25108] device hsr_slave_0 entered promiscuous mode [ 3126.541475][T25108] device hsr_slave_1 entered promiscuous mode [ 3126.601159][T25108] debugfs: Directory 'hsr0' with parent '/' already present! [ 3126.673496][T25106] device hsr_slave_0 entered promiscuous mode [ 3126.701670][T25106] device hsr_slave_1 entered promiscuous mode [ 3126.741014][T25106] debugfs: Directory 'hsr0' with parent '/' already present! [ 3126.857542][T25108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3126.888551][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3126.899492][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3126.910532][T25108] 8021q: adding VLAN 0 to HW filter on device team0 [ 3126.925708][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3126.935189][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3126.943676][T22244] bridge0: port 1(bridge_slave_0) entered blocking state [ 3126.950781][T22244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3126.964352][T25106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3126.974926][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3126.992573][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3127.002057][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3127.010568][T15626] bridge0: port 2(bridge_slave_1) entered blocking state [ 3127.017629][T15626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3127.026244][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3127.035316][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3127.044164][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3127.052870][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3127.061779][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3127.070243][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3127.079998][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3127.105672][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3127.121765][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3127.130067][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3127.139022][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3127.151247][T25106] 8021q: adding VLAN 0 to HW filter on device team0 [ 3127.162647][T25108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3127.172943][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3127.180711][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3127.188636][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3127.197768][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3127.206332][T22243] bridge0: port 1(bridge_slave_0) entered blocking state [ 3127.213553][T22243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3127.223420][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3127.231997][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3127.241185][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3127.251086][T22243] bridge0: port 2(bridge_slave_1) entered blocking state [ 3127.258358][T22243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3127.275746][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3127.283582][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3127.291050][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3127.303988][T25108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3127.311050][ T9164] tipc: TX() has been purged, node left! [ 3127.320151][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3127.340099][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3127.349014][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3127.358585][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3127.367844][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3127.376588][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3127.384918][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3127.393425][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3127.401875][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3127.410243][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3127.424367][T25106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3127.447027][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3127.458068][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3127.461152][ T9164] tipc: TX() has been purged, node left! [ 3127.468860][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3127.478792][ T9164] tipc: TX() has been purged, node left! [ 3127.485729][T25106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3127.505252][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3127.514538][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3127.522899][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3127.532771][T25108] device veth0_vlan entered promiscuous mode [ 3127.544785][T25108] device veth1_vlan entered promiscuous mode 16:03:28 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:28 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3127.830865][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3127.839936][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3127.853116][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3127.892608][T25106] device veth0_vlan entered promiscuous mode [ 3128.067941][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3128.076248][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3128.086612][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3128.094875][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3128.200239][T25106] device veth1_vlan entered promiscuous mode 16:03:29 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:29 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) 16:03:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:29 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYBLOB=',obj_user=\\,uid', @ANYRESDEC=r6, @ANYBLOB=',\x00']) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x2, {0x2003b, 0x200, 0x7d, 0x1}}) 16:03:29 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:29 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:29 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3129.011142][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3129.030230][T22243] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:03:30 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:30 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:30 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:30 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:30 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3130.713867][ T9164] device bridge_slave_1 left promiscuous mode [ 3130.720131][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3130.781692][ T9164] device bridge_slave_0 left promiscuous mode [ 3130.787936][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3130.864078][ T9164] device bridge_slave_1 left promiscuous mode [ 3130.870377][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3130.941728][ T9164] device bridge_slave_0 left promiscuous mode [ 3130.948017][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3131.009951][ T9164] device bridge_slave_1 left promiscuous mode [ 3131.024825][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3131.104749][ T9164] device bridge_slave_0 left promiscuous mode [ 3131.125029][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3131.187263][ T9164] device veth1_vlan left promiscuous mode [ 3131.193373][ T9164] device veth0_vlan left promiscuous mode [ 3131.199485][ T9164] device veth1_vlan left promiscuous mode [ 3131.205500][ T9164] device veth0_vlan left promiscuous mode [ 3131.211493][ T9164] device veth1_vlan left promiscuous mode [ 3131.217341][ T9164] device veth0_vlan left promiscuous mode [ 3133.771363][ T9164] device hsr_slave_0 left promiscuous mode [ 3133.831103][ T9164] device hsr_slave_1 left promiscuous mode [ 3133.877910][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3133.888505][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3133.898808][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3133.924579][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3134.015170][ T9164] bond0 (unregistering): Released all slaves [ 3134.231377][ T9164] device hsr_slave_0 left promiscuous mode [ 3134.271126][ T9164] device hsr_slave_1 left promiscuous mode [ 3134.318733][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3134.329257][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3134.339707][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3134.375186][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3134.443674][ T9164] bond0 (unregistering): Released all slaves [ 3134.661502][ T9164] device hsr_slave_0 left promiscuous mode [ 3134.721162][ T9164] device hsr_slave_1 left promiscuous mode [ 3134.789056][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3134.799578][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3134.809804][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3134.845568][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3134.904759][ T9164] bond0 (unregistering): Released all slaves [ 3135.011820][T25212] IPVS: ftp: loaded support on port[0] = 21 [ 3135.016711][T25213] IPVS: ftp: loaded support on port[0] = 21 [ 3135.024855][T25209] IPVS: ftp: loaded support on port[0] = 21 [ 3135.161176][T25212] chnl_net:caif_netlink_parms(): no params data found [ 3135.209227][T25213] chnl_net:caif_netlink_parms(): no params data found [ 3135.235495][T25209] chnl_net:caif_netlink_parms(): no params data found [ 3135.258969][T25212] bridge0: port 1(bridge_slave_0) entered blocking state [ 3135.266123][T25212] bridge0: port 1(bridge_slave_0) entered disabled state [ 3135.274138][T25212] device bridge_slave_0 entered promiscuous mode [ 3135.297404][T25213] bridge0: port 1(bridge_slave_0) entered blocking state [ 3135.304542][T25213] bridge0: port 1(bridge_slave_0) entered disabled state [ 3135.312884][T25213] device bridge_slave_0 entered promiscuous mode [ 3135.320443][T25212] bridge0: port 2(bridge_slave_1) entered blocking state [ 3135.328334][T25212] bridge0: port 2(bridge_slave_1) entered disabled state [ 3135.336484][T25212] device bridge_slave_1 entered promiscuous mode [ 3135.363415][T25213] bridge0: port 2(bridge_slave_1) entered blocking state [ 3135.370477][T25213] bridge0: port 2(bridge_slave_1) entered disabled state [ 3135.379309][T25213] device bridge_slave_1 entered promiscuous mode [ 3135.388282][T25212] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3135.401158][T25212] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3135.419999][T25209] bridge0: port 1(bridge_slave_0) entered blocking state [ 3135.427205][T25209] bridge0: port 1(bridge_slave_0) entered disabled state [ 3135.435246][T25209] device bridge_slave_0 entered promiscuous mode [ 3135.447291][T25209] bridge0: port 2(bridge_slave_1) entered blocking state [ 3135.454475][T25209] bridge0: port 2(bridge_slave_1) entered disabled state [ 3135.463116][T25209] device bridge_slave_1 entered promiscuous mode [ 3135.480502][T25213] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3135.492529][T25213] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3135.510267][T25212] team0: Port device team_slave_0 added [ 3135.517037][T25212] team0: Port device team_slave_1 added [ 3135.530011][T25209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3135.632741][T25213] team0: Port device team_slave_0 added [ 3135.639720][T25209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3135.743794][T25212] device hsr_slave_0 entered promiscuous mode [ 3135.811394][T25212] device hsr_slave_1 entered promiscuous mode [ 3135.876342][T25213] team0: Port device team_slave_1 added [ 3135.911983][T25209] team0: Port device team_slave_0 added [ 3135.919212][T25209] team0: Port device team_slave_1 added [ 3135.987475][T25213] device hsr_slave_0 entered promiscuous mode [ 3136.045430][T25213] device hsr_slave_1 entered promiscuous mode [ 3136.121242][T25213] debugfs: Directory 'hsr0' with parent '/' already present! [ 3136.233647][T25209] device hsr_slave_0 entered promiscuous mode [ 3136.291370][T25209] device hsr_slave_1 entered promiscuous mode [ 3136.331028][T25209] debugfs: Directory 'hsr0' with parent '/' already present! [ 3136.456650][T25212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3136.475188][T25213] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3136.488687][T25212] 8021q: adding VLAN 0 to HW filter on device team0 [ 3136.500377][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3136.508507][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3136.529278][T25209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3136.551985][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3136.564630][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3136.573355][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 3136.580399][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3136.592721][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3136.604588][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3136.614391][ T8066] bridge0: port 2(bridge_slave_1) entered blocking state [ 3136.621485][ T8066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3136.646021][T25209] 8021q: adding VLAN 0 to HW filter on device team0 [ 3136.663247][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3136.671257][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3136.680267][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3136.689930][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3136.698130][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3136.705960][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3136.716168][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3136.725147][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3136.733141][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3136.744631][T25213] 8021q: adding VLAN 0 to HW filter on device team0 [ 3136.755215][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3136.764117][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3136.772855][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3136.782310][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3136.791112][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3136.799528][ T9606] bridge0: port 1(bridge_slave_0) entered blocking state [ 3136.806736][ T9606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3136.815382][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3136.828743][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3136.837740][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3136.846745][ T8055] bridge0: port 2(bridge_slave_1) entered blocking state [ 3136.853951][ T8055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3136.862035][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3136.870413][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3136.891413][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3136.900238][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3136.910687][ T9606] bridge0: port 1(bridge_slave_0) entered blocking state [ 3136.917764][ T9606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3136.926071][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3136.935336][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3136.944135][ T9606] bridge0: port 2(bridge_slave_1) entered blocking state [ 3136.951322][ T9606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3136.959558][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3136.968585][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3136.977482][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3136.985930][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3136.995102][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3137.006692][T25212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3137.017601][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3137.026434][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3137.035648][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3137.045916][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3137.062806][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3137.070268][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3137.088964][T25212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3137.099580][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3137.109150][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3137.122504][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3137.131831][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3137.144137][T25209] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3137.159402][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3137.168567][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3137.198248][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3137.207429][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3137.217019][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3137.225185][ T9164] tipc: TX() has been purged, node left! [ 3137.226125][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3137.239256][ T9164] tipc: TX() has been purged, node left! [ 3137.240150][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3137.253999][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3137.262599][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3137.270211][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3137.277921][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3137.292371][T25209] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3137.306720][T25213] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3137.325850][T25213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3137.334654][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3137.343418][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3137.351776][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3137.360485][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3137.378074][T25212] device veth0_vlan entered promiscuous mode [ 3137.498645][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3137.507557][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3137.516754][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3137.524315][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3137.532245][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3137.540174][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3137.610770][T25213] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3137.621197][T25212] device veth1_vlan entered promiscuous mode [ 3137.645360][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3137.653867][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3137.663149][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3137.672158][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3137.787884][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3137.796427][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3137.805599][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3137.814108][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3137.824994][T25209] device veth0_vlan entered promiscuous mode [ 3137.839112][T25209] device veth1_vlan entered promiscuous mode [ 3137.952369][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3137.960695][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3137.969596][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3137.978989][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3138.107326][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3138.115944][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3138.127587][T25213] device veth0_vlan entered promiscuous mode [ 3138.140478][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3138.148854][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3138.310501][T25213] device veth1_vlan entered promiscuous mode 16:03:39 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:39 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:39 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:39 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:39 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:39 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:39 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:39 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:40 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:40 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:40 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3139.497411][ T9164] device bridge_slave_1 left promiscuous mode [ 3139.513706][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state 16:03:40 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3139.581681][ T9164] device bridge_slave_0 left promiscuous mode [ 3139.590186][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3139.675658][ T9164] device bridge_slave_1 left promiscuous mode [ 3139.702361][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3139.773339][ T9164] device bridge_slave_0 left promiscuous mode [ 3139.779630][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3139.859146][ T9164] device veth1_vlan left promiscuous mode [ 3139.878125][ T9164] device veth0_vlan left promiscuous mode [ 3139.908665][ T9164] device veth1_vlan left promiscuous mode [ 3139.918402][ T9164] device veth0_vlan left promiscuous mode [ 3142.181326][ T9164] device hsr_slave_0 left promiscuous mode [ 3142.221118][ T9164] device hsr_slave_1 left promiscuous mode [ 3142.268814][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3142.279891][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3142.291172][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3142.324618][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3142.394784][ T9164] bond0 (unregistering): Released all slaves [ 3142.601817][ T9164] device hsr_slave_0 left promiscuous mode [ 3142.641109][ T9164] device hsr_slave_1 left promiscuous mode [ 3142.688108][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3142.698596][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3142.708939][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3142.745779][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3142.815248][ T9164] bond0 (unregistering): Released all slaves [ 3142.908401][T25267] IPVS: ftp: loaded support on port[0] = 21 [ 3142.908596][T25271] IPVS: ftp: loaded support on port[0] = 21 [ 3142.927954][T25273] IPVS: ftp: loaded support on port[0] = 21 [ 3142.928173][T25272] IPVS: ftp: loaded support on port[0] = 21 [ 3143.073329][T25267] chnl_net:caif_netlink_parms(): no params data found [ 3143.175772][T25273] chnl_net:caif_netlink_parms(): no params data found [ 3143.264065][T25267] bridge0: port 1(bridge_slave_0) entered blocking state [ 3143.271454][T25267] bridge0: port 1(bridge_slave_0) entered disabled state [ 3143.279440][T25267] device bridge_slave_0 entered promiscuous mode [ 3143.308317][T25271] chnl_net:caif_netlink_parms(): no params data found [ 3143.318146][T25273] bridge0: port 1(bridge_slave_0) entered blocking state [ 3143.326110][T25273] bridge0: port 1(bridge_slave_0) entered disabled state [ 3143.334411][T25273] device bridge_slave_0 entered promiscuous mode [ 3143.345897][T25267] bridge0: port 2(bridge_slave_1) entered blocking state [ 3143.353518][T25267] bridge0: port 2(bridge_slave_1) entered disabled state [ 3143.365288][T25267] device bridge_slave_1 entered promiscuous mode [ 3143.379015][T25273] bridge0: port 2(bridge_slave_1) entered blocking state [ 3143.390421][T25273] bridge0: port 2(bridge_slave_1) entered disabled state [ 3143.399570][T25273] device bridge_slave_1 entered promiscuous mode [ 3143.425684][T25267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3143.448368][T25267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3143.472558][T25272] chnl_net:caif_netlink_parms(): no params data found [ 3143.501113][T25273] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3143.533461][T25271] bridge0: port 1(bridge_slave_0) entered blocking state [ 3143.541338][T25271] bridge0: port 1(bridge_slave_0) entered disabled state [ 3143.549269][T25271] device bridge_slave_0 entered promiscuous mode [ 3143.558674][T25273] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3143.569919][T25267] team0: Port device team_slave_0 added [ 3143.579563][T25267] team0: Port device team_slave_1 added [ 3143.585902][T25271] bridge0: port 2(bridge_slave_1) entered blocking state [ 3143.593492][T25271] bridge0: port 2(bridge_slave_1) entered disabled state [ 3143.601717][T25271] device bridge_slave_1 entered promiscuous mode [ 3143.636222][T25272] bridge0: port 1(bridge_slave_0) entered blocking state [ 3143.651678][T25272] bridge0: port 1(bridge_slave_0) entered disabled state [ 3143.659642][T25272] device bridge_slave_0 entered promiscuous mode [ 3143.677179][T25273] team0: Port device team_slave_0 added [ 3143.696432][T25271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3143.713845][T25272] bridge0: port 2(bridge_slave_1) entered blocking state [ 3143.720998][T25272] bridge0: port 2(bridge_slave_1) entered disabled state [ 3143.729184][T25272] device bridge_slave_1 entered promiscuous mode [ 3143.741195][T25273] team0: Port device team_slave_1 added [ 3143.756685][T25271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3143.803120][T25267] device hsr_slave_0 entered promiscuous mode [ 3143.851417][T25267] device hsr_slave_1 entered promiscuous mode [ 3143.891139][T25267] debugfs: Directory 'hsr0' with parent '/' already present! [ 3143.926159][T25271] team0: Port device team_slave_0 added [ 3143.933974][T25272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3143.983747][T25273] device hsr_slave_0 entered promiscuous mode [ 3144.021541][T25273] device hsr_slave_1 entered promiscuous mode [ 3144.061157][T25273] debugfs: Directory 'hsr0' with parent '/' already present! [ 3144.071535][T25271] team0: Port device team_slave_1 added [ 3144.081234][T25272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3144.150035][T25272] team0: Port device team_slave_0 added [ 3144.233708][T25271] device hsr_slave_0 entered promiscuous mode [ 3144.271547][T25271] device hsr_slave_1 entered promiscuous mode [ 3144.341017][T25271] debugfs: Directory 'hsr0' with parent '/' already present! [ 3144.357228][T25272] team0: Port device team_slave_1 added [ 3144.433588][T25272] device hsr_slave_0 entered promiscuous mode [ 3144.471510][T25272] device hsr_slave_1 entered promiscuous mode [ 3144.511077][T25272] debugfs: Directory 'hsr0' with parent '/' already present! [ 3144.647880][T25267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3144.677652][T25271] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3144.684704][ T9164] tipc: TX() has been purged, node left! [ 3144.691362][ T9164] tipc: TX() has been purged, node left! [ 3144.704863][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3144.712986][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3144.722997][ T9164] tipc: TX() has been purged, node left! [ 3144.723969][T25271] 8021q: adding VLAN 0 to HW filter on device team0 [ 3144.736966][ T9164] tipc: TX() has been purged, node left! [ 3144.739583][T25267] 8021q: adding VLAN 0 to HW filter on device team0 [ 3144.754214][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3144.762382][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3144.770404][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3144.779323][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3144.787999][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3144.795179][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3144.808159][T25273] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3144.818601][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3144.827963][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3144.837281][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3144.846062][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3144.853126][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3144.871841][T25273] 8021q: adding VLAN 0 to HW filter on device team0 [ 3145.081961][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3145.093706][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3145.103331][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3145.112237][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state [ 3145.119267][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3145.127425][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3145.135441][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3145.143247][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3145.152390][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3145.161216][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3145.169651][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state [ 3145.176685][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3145.185060][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3145.194403][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3145.203329][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3145.212721][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3145.221374][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3145.229994][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3145.238631][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3145.247531][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3145.378978][T25267] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3145.389974][T25267] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3145.402485][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3145.411665][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3145.420148][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3145.428774][T17599] bridge0: port 1(bridge_slave_0) entered blocking state [ 3145.435835][T17599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3145.443971][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3145.452561][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3145.460964][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3145.470077][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3145.478928][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3145.487747][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3145.496675][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3145.505274][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3145.513711][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3145.522465][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3145.530953][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3145.539043][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3145.547172][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3145.556946][T25271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3145.569530][T25272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3145.701871][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3145.710857][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3145.720054][T15626] bridge0: port 2(bridge_slave_1) entered blocking state [ 3145.727238][T15626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3145.736884][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3145.745850][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3145.754863][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3145.762508][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3145.770098][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3145.778905][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3145.788170][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3145.807858][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3145.816263][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3145.824351][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3145.833103][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3145.842447][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3145.850860][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3145.859480][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3145.867078][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3145.880422][T25267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3145.996601][T25272] 8021q: adding VLAN 0 to HW filter on device team0 [ 3146.006378][T25271] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3146.020113][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3146.030151][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3146.046173][T25273] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3146.169926][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3146.179176][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3146.188214][T15626] bridge0: port 1(bridge_slave_0) entered blocking state [ 3146.195371][T15626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3146.204213][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3146.213060][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3146.221642][T15626] bridge0: port 2(bridge_slave_1) entered blocking state [ 3146.228816][T15626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3146.238193][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3146.246829][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3146.387865][T25272] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3146.398695][T25272] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3146.410670][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3146.423765][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3146.433107][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3146.444463][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3146.453420][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3146.462393][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3146.471417][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3146.480337][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3146.488881][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3146.497601][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3146.506017][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3146.633987][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3146.642048][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3146.649648][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3146.658868][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3146.667831][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3146.675315][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3146.683132][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3146.692326][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3146.704538][T25273] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3146.716998][T25272] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3146.848395][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3146.857138][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3146.865847][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3146.877539][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3146.886719][T25267] device veth0_vlan entered promiscuous mode [ 3147.031971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3147.040414][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3147.049873][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3147.058248][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3147.072447][T25267] device veth1_vlan entered promiscuous mode [ 3147.079761][T25271] device veth0_vlan entered promiscuous mode [ 3147.111371][ T9164] device bridge_slave_1 left promiscuous mode [ 3147.117758][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3147.141823][ T9164] device bridge_slave_0 left promiscuous mode [ 3147.148050][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3147.214407][ T9164] device bridge_slave_1 left promiscuous mode [ 3147.220675][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3147.271859][ T9164] device bridge_slave_0 left promiscuous mode [ 3147.278101][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3147.334256][ T9164] device bridge_slave_1 left promiscuous mode [ 3147.340498][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3147.395099][ T9164] device bridge_slave_0 left promiscuous mode [ 3147.401386][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3147.454152][ T9164] device bridge_slave_1 left promiscuous mode [ 3147.460316][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3147.515005][ T9164] device bridge_slave_0 left promiscuous mode [ 3147.521256][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3147.568433][ T9164] device veth1_vlan left promiscuous mode [ 3147.574589][ T9164] device veth0_vlan left promiscuous mode [ 3147.580422][ T9164] device veth1_vlan left promiscuous mode [ 3147.586258][ T9164] device veth0_vlan left promiscuous mode [ 3147.592141][ T9164] device veth1_vlan left promiscuous mode [ 3147.597851][ T9164] device veth0_vlan left promiscuous mode [ 3147.603901][ T9164] device veth1_vlan left promiscuous mode [ 3147.609659][ T9164] device veth0_vlan left promiscuous mode [ 3150.861452][ T9164] device hsr_slave_0 left promiscuous mode [ 3150.901191][ T9164] device hsr_slave_1 left promiscuous mode [ 3150.948177][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3150.958940][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3150.969603][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3151.005167][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3151.076138][ T9164] bond0 (unregistering): Released all slaves [ 3151.261704][ T9164] device hsr_slave_0 left promiscuous mode [ 3151.331104][ T9164] device hsr_slave_1 left promiscuous mode [ 3151.377668][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3151.388114][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3151.398080][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3151.425174][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3151.504465][ T9164] bond0 (unregistering): Released all slaves [ 3151.681388][ T9164] device hsr_slave_0 left promiscuous mode [ 3151.721371][ T9164] device hsr_slave_1 left promiscuous mode [ 3151.768408][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3151.779494][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3151.789697][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3151.824995][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3151.888460][ T9164] bond0 (unregistering): Released all slaves [ 3152.121526][ T9164] device hsr_slave_0 left promiscuous mode [ 3152.161111][ T9164] device hsr_slave_1 left promiscuous mode [ 3152.208026][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3152.218273][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3152.228753][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3152.274530][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3152.392358][ T9164] bond0 (unregistering): Released all slaves [ 3152.520726][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3152.529081][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3152.538091][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3152.547038][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3152.555227][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3152.564686][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3152.573018][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3152.582097][T25273] device veth0_vlan entered promiscuous mode [ 3152.605053][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3152.614066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3152.625196][T25273] device veth1_vlan entered promiscuous mode [ 3152.645181][T25271] device veth1_vlan entered promiscuous mode [ 3152.666720][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3152.688233][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3152.713772][T25272] device veth0_vlan entered promiscuous mode [ 3152.721622][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3152.731753][T23656] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3152.745325][T25272] device veth1_vlan entered promiscuous mode 16:03:53 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:53 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:54 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:54 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:54 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:54 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:54 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3153.561231][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3153.569614][T22244] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:03:54 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:54 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:54 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:54 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:03:55 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:03:55 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3156.032164][T25372] IPVS: ftp: loaded support on port[0] = 21 [ 3156.060978][ T9164] tipc: TX() has been purged, node left! [ 3156.067444][ T9164] tipc: TX() has been purged, node left! [ 3156.096333][T25372] chnl_net:caif_netlink_parms(): no params data found [ 3156.218941][T25372] bridge0: port 1(bridge_slave_0) entered blocking state [ 3156.226204][T25372] bridge0: port 1(bridge_slave_0) entered disabled state [ 3156.234086][T25372] device bridge_slave_0 entered promiscuous mode [ 3156.288779][T25372] bridge0: port 2(bridge_slave_1) entered blocking state [ 3156.296394][T25372] bridge0: port 2(bridge_slave_1) entered disabled state [ 3156.305317][T25372] device bridge_slave_1 entered promiscuous mode [ 3156.322057][T25372] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3156.382196][T25372] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3156.400720][T25372] team0: Port device team_slave_0 added [ 3156.407448][T25372] team0: Port device team_slave_1 added [ 3156.463541][T25372] device hsr_slave_0 entered promiscuous mode [ 3156.521626][T25372] device hsr_slave_1 entered promiscuous mode [ 3156.698872][T25372] bridge0: port 2(bridge_slave_1) entered blocking state [ 3156.705983][T25372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3156.713364][T25372] bridge0: port 1(bridge_slave_0) entered blocking state [ 3156.720402][T25372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3156.756085][T25372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3156.770014][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3156.774678][T25375] IPVS: ftp: loaded support on port[0] = 21 [ 3156.784035][T18056] bridge0: port 1(bridge_slave_0) entered disabled state [ 3156.794463][T18056] bridge0: port 2(bridge_slave_1) entered disabled state [ 3156.804214][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3156.866534][T25372] 8021q: adding VLAN 0 to HW filter on device team0 [ 3156.879838][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3156.888644][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3156.895694][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3156.972090][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3156.980617][T18056] bridge0: port 2(bridge_slave_1) entered blocking state [ 3156.987687][T18056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3157.007144][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3157.015955][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3157.086970][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3157.096039][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3157.128083][T25372] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3157.139513][T25372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3157.147659][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3157.156196][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3157.224882][T25375] chnl_net:caif_netlink_parms(): no params data found [ 3157.245208][ T9164] device bridge_slave_1 left promiscuous mode [ 3157.251592][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3157.301779][ T9164] device bridge_slave_0 left promiscuous mode [ 3157.307952][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3157.364140][ T9164] device bridge_slave_1 left promiscuous mode [ 3157.370385][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3157.402408][ T9164] device bridge_slave_0 left promiscuous mode [ 3157.408693][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3157.455223][ T9164] device veth1_vlan left promiscuous mode [ 3157.461144][ T9164] device veth0_vlan left promiscuous mode [ 3157.467209][ T9164] device veth1_vlan left promiscuous mode [ 3157.473071][ T9164] device veth0_vlan left promiscuous mode [ 3159.131546][ T9164] device hsr_slave_0 left promiscuous mode [ 3159.211185][ T9164] device hsr_slave_1 left promiscuous mode [ 3159.277931][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3159.288361][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3159.298472][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3159.325234][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3159.383977][ T9164] bond0 (unregistering): Released all slaves [ 3159.571420][ T9164] device hsr_slave_0 left promiscuous mode [ 3159.631097][ T9164] device hsr_slave_1 left promiscuous mode [ 3159.687984][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3159.698622][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3159.708959][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3159.744395][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3159.805349][ T9164] bond0 (unregistering): Released all slaves [ 3159.943047][T25375] bridge0: port 1(bridge_slave_0) entered blocking state [ 3159.950141][T25375] bridge0: port 1(bridge_slave_0) entered disabled state [ 3159.958381][T25375] device bridge_slave_0 entered promiscuous mode [ 3159.966547][T25375] bridge0: port 2(bridge_slave_1) entered blocking state [ 3159.973673][T25375] bridge0: port 2(bridge_slave_1) entered disabled state [ 3159.982289][T25375] device bridge_slave_1 entered promiscuous mode [ 3160.000738][T25375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3160.014861][T25375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3160.034778][T25375] team0: Port device team_slave_0 added [ 3160.042034][T25375] team0: Port device team_slave_1 added [ 3160.050524][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3160.058003][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3160.068951][T25372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3160.143537][T25375] device hsr_slave_0 entered promiscuous mode [ 3160.201453][T25375] device hsr_slave_1 entered promiscuous mode [ 3160.271008][T25375] debugfs: Directory 'hsr0' with parent '/' already present! [ 3160.328520][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3160.337383][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3160.371671][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3160.380068][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3160.391540][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3160.399340][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3160.451010][T25372] device veth0_vlan entered promiscuous mode [ 3160.473598][T25372] device veth1_vlan entered promiscuous mode [ 3160.483620][T25375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3160.505219][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3160.528506][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3160.547075][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3160.567217][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3160.583290][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3160.594341][T25375] 8021q: adding VLAN 0 to HW filter on device team0 [ 3160.606856][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3160.616592][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3160.627580][T17599] bridge0: port 1(bridge_slave_0) entered blocking state [ 3160.634697][T17599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3160.655949][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3160.669204][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3160.678673][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3160.689969][ T9606] bridge0: port 2(bridge_slave_1) entered blocking state [ 3160.697036][ T9606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3160.720877][T25375] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3160.734675][T25375] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3160.751350][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3160.760281][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3160.770373][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3160.780767][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3160.790137][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3160.801733][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3160.819691][T25375] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3160.843961][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3160.891328][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 16:04:01 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:01 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:01 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:01 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3161.054602][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3161.074820][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3161.155833][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3161.188423][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3161.238064][T25375] device veth0_vlan entered promiscuous mode [ 3161.265811][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 16:04:02 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3161.355661][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3161.445758][T25375] device veth1_vlan entered promiscuous mode 16:04:02 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3161.951099][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3161.959343][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:04:03 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:03 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:03 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:03 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:03 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3163.241563][ T9164] tipc: TX() has been purged, node left! [ 3163.913757][ T9164] device bridge_slave_1 left promiscuous mode [ 3163.919987][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3163.981655][ T9164] device bridge_slave_0 left promiscuous mode [ 3163.987843][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3164.034118][ T9164] device veth1_vlan left promiscuous mode [ 3164.039926][ T9164] device veth0_vlan left promiscuous mode [ 3164.971449][ T9164] device hsr_slave_0 left promiscuous mode [ 3165.011104][ T9164] device hsr_slave_1 left promiscuous mode [ 3165.058115][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3165.068718][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3165.078826][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3165.115008][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3165.195202][ T9164] bond0 (unregistering): Released all slaves [ 3165.318590][T25477] IPVS: ftp: loaded support on port[0] = 21 [ 3165.370715][T25477] chnl_net:caif_netlink_parms(): no params data found [ 3165.397977][T25477] bridge0: port 1(bridge_slave_0) entered blocking state [ 3165.405123][T25477] bridge0: port 1(bridge_slave_0) entered disabled state [ 3165.412863][T25477] device bridge_slave_0 entered promiscuous mode [ 3165.420300][T25477] bridge0: port 2(bridge_slave_1) entered blocking state [ 3165.427451][T25477] bridge0: port 2(bridge_slave_1) entered disabled state [ 3165.435263][T25477] device bridge_slave_1 entered promiscuous mode [ 3165.493677][T25477] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3165.504622][T25477] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3165.524622][T25477] team0: Port device team_slave_0 added [ 3165.531980][T25477] team0: Port device team_slave_1 added [ 3165.585546][T25477] device hsr_slave_0 entered promiscuous mode [ 3165.644013][T25477] device hsr_slave_1 entered promiscuous mode [ 3165.690957][T25477] debugfs: Directory 'hsr0' with parent '/' already present! [ 3165.727011][T25477] bridge0: port 2(bridge_slave_1) entered blocking state [ 3165.734110][T25477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3165.741411][T25477] bridge0: port 1(bridge_slave_0) entered blocking state [ 3165.748452][T25477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3165.790549][T25477] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3165.807033][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3165.818951][ T9606] bridge0: port 1(bridge_slave_0) entered disabled state [ 3165.827206][ T9606] bridge0: port 2(bridge_slave_1) entered disabled state [ 3165.843465][T25477] 8021q: adding VLAN 0 to HW filter on device team0 [ 3165.857055][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3165.865803][ T9606] bridge0: port 1(bridge_slave_0) entered blocking state [ 3165.872900][ T9606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3165.891760][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3165.900652][T24658] bridge0: port 2(bridge_slave_1) entered blocking state [ 3165.907722][T24658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3165.916836][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3165.925873][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3165.942312][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3165.961899][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3165.970240][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3165.992912][T25477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3166.007488][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3166.014990][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3166.025765][T25477] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3166.085809][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3166.109808][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3166.119111][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3166.127773][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3166.140176][T25477] device veth0_vlan entered promiscuous mode [ 3166.150724][T25477] device veth1_vlan entered promiscuous mode 16:04:07 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:07 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:07 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:07 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:07 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:07 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3166.330345][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3166.358773][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3166.521359][ T9164] tipc: TX() has been purged, node left! 16:04:07 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:07 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:07 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:07 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:08 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:08 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:08 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:08 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3168.655965][ T9164] device bridge_slave_1 left promiscuous mode [ 3168.673358][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3168.701724][ T9164] device bridge_slave_0 left promiscuous mode [ 3168.707996][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3168.783598][ T9164] device veth1_vlan left promiscuous mode [ 3168.800940][ T9164] device veth0_vlan left promiscuous mode [ 3169.821655][ T9164] device hsr_slave_0 left promiscuous mode [ 3169.861110][ T9164] device hsr_slave_1 left promiscuous mode [ 3169.917750][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3169.928401][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3169.938695][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3169.995863][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3170.089580][ T9164] bond0 (unregistering): Released all slaves [ 3170.211726][T25548] IPVS: ftp: loaded support on port[0] = 21 [ 3170.212281][T25551] IPVS: ftp: loaded support on port[0] = 21 [ 3170.223639][T25552] IPVS: ftp: loaded support on port[0] = 21 [ 3170.403092][T25551] chnl_net:caif_netlink_parms(): no params data found [ 3170.456865][T25552] chnl_net:caif_netlink_parms(): no params data found [ 3170.503709][T25548] chnl_net:caif_netlink_parms(): no params data found [ 3170.528399][T25551] bridge0: port 1(bridge_slave_0) entered blocking state [ 3170.538476][T25551] bridge0: port 1(bridge_slave_0) entered disabled state [ 3170.547581][T25551] device bridge_slave_0 entered promiscuous mode [ 3170.569708][T25551] bridge0: port 2(bridge_slave_1) entered blocking state [ 3170.591015][T25551] bridge0: port 2(bridge_slave_1) entered disabled state [ 3170.598908][T25551] device bridge_slave_1 entered promiscuous mode [ 3170.612301][T25552] bridge0: port 1(bridge_slave_0) entered blocking state [ 3170.619351][T25552] bridge0: port 1(bridge_slave_0) entered disabled state [ 3170.631642][T25552] device bridge_slave_0 entered promiscuous mode [ 3170.664711][T25552] bridge0: port 2(bridge_slave_1) entered blocking state [ 3170.675831][T25552] bridge0: port 2(bridge_slave_1) entered disabled state [ 3170.683850][T25552] device bridge_slave_1 entered promiscuous mode [ 3170.695271][T25548] bridge0: port 1(bridge_slave_0) entered blocking state [ 3170.706418][T25548] bridge0: port 1(bridge_slave_0) entered disabled state [ 3170.714222][T25548] device bridge_slave_0 entered promiscuous mode [ 3170.726872][T25551] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3170.741088][T25548] bridge0: port 2(bridge_slave_1) entered blocking state [ 3170.748315][T25548] bridge0: port 2(bridge_slave_1) entered disabled state [ 3170.756515][T25548] device bridge_slave_1 entered promiscuous mode [ 3170.770629][T25551] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3170.802450][T25552] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3170.825089][T25551] team0: Port device team_slave_0 added [ 3170.841932][T25552] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3170.855678][T25548] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3170.865959][T25551] team0: Port device team_slave_1 added [ 3170.888910][T25552] team0: Port device team_slave_0 added [ 3170.896179][T25548] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3170.953319][T25551] device hsr_slave_0 entered promiscuous mode [ 3170.991427][T25551] device hsr_slave_1 entered promiscuous mode [ 3171.051051][T25551] debugfs: Directory 'hsr0' with parent '/' already present! [ 3171.059536][T25552] team0: Port device team_slave_1 added [ 3171.074746][T25548] team0: Port device team_slave_0 added [ 3171.116315][T25548] team0: Port device team_slave_1 added [ 3171.173771][T25552] device hsr_slave_0 entered promiscuous mode [ 3171.211500][T25552] device hsr_slave_1 entered promiscuous mode [ 3171.274304][T25552] debugfs: Directory 'hsr0' with parent '/' already present! [ 3171.353511][T25548] device hsr_slave_0 entered promiscuous mode [ 3171.391562][T25548] device hsr_slave_1 entered promiscuous mode [ 3171.441038][T25548] debugfs: Directory 'hsr0' with parent '/' already present! [ 3171.522451][T25551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3171.555198][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3171.567181][ T9164] tipc: TX() has been purged, node left! [ 3171.567406][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3171.580652][ T9164] tipc: TX() has been purged, node left! [ 3171.587308][T25551] 8021q: adding VLAN 0 to HW filter on device team0 [ 3171.603740][T25548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3171.615961][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3171.628443][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3171.636998][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3171.644167][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3171.652871][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3171.772286][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3171.780486][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3171.788551][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3171.797424][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3171.806235][T24658] bridge0: port 2(bridge_slave_1) entered blocking state [ 3171.813315][T24658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3171.821694][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3171.834229][T25548] 8021q: adding VLAN 0 to HW filter on device team0 [ 3171.912195][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3171.922237][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3171.930844][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3171.940014][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3171.948899][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3171.957674][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3171.966811][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3171.975678][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3171.985004][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3171.993777][ T9606] bridge0: port 1(bridge_slave_0) entered blocking state [ 3172.001106][ T9606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3172.009119][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3172.017985][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3172.026440][ T9606] bridge0: port 2(bridge_slave_1) entered blocking state [ 3172.033597][ T9606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3172.042024][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3172.050969][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3172.060349][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3172.068630][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3172.078940][T25551] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3172.090740][T25551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3172.161248][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3172.169761][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3172.178556][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3172.187243][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3172.196074][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3172.204858][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3172.213714][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3172.224444][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3172.241453][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3172.302804][T25548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3172.313498][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3172.323411][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3172.387492][T25551] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3172.405824][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3172.415211][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3172.427689][T25552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3172.497215][T25548] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3172.508151][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3172.516974][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3172.527755][T25552] 8021q: adding VLAN 0 to HW filter on device team0 [ 3172.602174][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3172.612398][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3172.621569][T24658] bridge0: port 1(bridge_slave_0) entered blocking state [ 3172.628601][T24658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3172.636685][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3172.645505][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3172.654149][T24658] bridge0: port 2(bridge_slave_1) entered blocking state [ 3172.661198][T24658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3172.668863][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3172.677797][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3172.687222][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3172.767226][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3172.776067][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3172.785075][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3172.793895][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3172.802892][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3172.811702][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3172.820221][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3172.828688][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3172.836987][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3172.845668][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3172.854204][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3172.862740][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3172.872067][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3172.880286][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3172.888524][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3172.897266][T25552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3172.954506][T25551] device veth0_vlan entered promiscuous mode [ 3172.975773][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3172.984556][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3172.996830][ T9164] device bridge_slave_1 left promiscuous mode [ 3173.003525][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3173.031551][ T9164] device bridge_slave_0 left promiscuous mode [ 3173.037721][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3173.084137][ T9164] device bridge_slave_1 left promiscuous mode [ 3173.090317][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3173.131747][ T9164] device bridge_slave_0 left promiscuous mode [ 3173.137919][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3173.195113][ T9164] device veth1_vlan left promiscuous mode [ 3173.200996][ T9164] device veth0_vlan left promiscuous mode [ 3173.206845][ T9164] device veth1_vlan left promiscuous mode [ 3173.212677][ T9164] device veth0_vlan left promiscuous mode [ 3174.871431][ T9164] device hsr_slave_0 left promiscuous mode [ 3174.931471][ T9164] device hsr_slave_1 left promiscuous mode [ 3174.997681][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3175.007818][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3175.018300][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3175.064602][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3175.143440][ T9164] bond0 (unregistering): Released all slaves [ 3175.341408][ T9164] device hsr_slave_0 left promiscuous mode [ 3175.381089][ T9164] device hsr_slave_1 left promiscuous mode [ 3175.427933][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3175.438101][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3175.448307][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3175.505162][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3175.604917][ T9164] bond0 (unregistering): Released all slaves [ 3175.694502][T25551] device veth1_vlan entered promiscuous mode [ 3175.724948][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3175.733323][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3175.744537][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3175.752936][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3175.761633][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3175.769324][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3175.781126][T25548] device veth0_vlan entered promiscuous mode [ 3175.791775][T25548] device veth1_vlan entered promiscuous mode [ 3175.805916][T25552] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3175.823623][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3175.831159][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 16:04:16 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3176.041140][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3176.049984][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3176.105091][T25552] device veth0_vlan entered promiscuous mode [ 3176.125497][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3176.139653][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3176.164693][T25552] device veth1_vlan entered promiscuous mode 16:04:17 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:17 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:17 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:17 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3176.354525][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3176.369721][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3176.390244][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 16:04:17 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:17 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3176.731242][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:04:18 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:18 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:18 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:18 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:18 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:18 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:18 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3178.943262][ T9164] tipc: TX() has been purged, node left! [ 3179.111030][ T9164] tipc: TX() has been purged, node left! [ 3179.618335][T25657] IPVS: ftp: loaded support on port[0] = 21 [ 3179.717967][T25657] chnl_net:caif_netlink_parms(): no params data found [ 3179.793111][T25657] bridge0: port 1(bridge_slave_0) entered blocking state [ 3179.800213][T25657] bridge0: port 1(bridge_slave_0) entered disabled state [ 3179.808888][T25657] device bridge_slave_0 entered promiscuous mode [ 3179.868528][T25657] bridge0: port 2(bridge_slave_1) entered blocking state [ 3179.875869][T25657] bridge0: port 2(bridge_slave_1) entered disabled state [ 3179.884229][T25657] device bridge_slave_1 entered promiscuous mode [ 3179.951721][T25657] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3179.962841][T25657] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3179.980949][T25657] team0: Port device team_slave_0 added [ 3179.987667][T25657] team0: Port device team_slave_1 added [ 3179.995589][ T9164] device bridge_slave_1 left promiscuous mode [ 3180.001809][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3180.031738][ T9164] device bridge_slave_0 left promiscuous mode [ 3180.037947][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3180.104016][ T9164] device bridge_slave_1 left promiscuous mode [ 3180.110270][ T9164] bridge0: port 2(bridge_slave_1) entered disabled state [ 3180.161647][ T9164] device bridge_slave_0 left promiscuous mode [ 3180.167812][ T9164] bridge0: port 1(bridge_slave_0) entered disabled state [ 3180.215001][ T9164] device veth1_vlan left promiscuous mode [ 3180.221054][ T9164] device veth0_vlan left promiscuous mode [ 3180.226937][ T9164] device veth1_vlan left promiscuous mode [ 3180.232735][ T9164] device veth0_vlan left promiscuous mode [ 3181.891280][ T9164] device hsr_slave_0 left promiscuous mode [ 3181.931045][ T9164] device hsr_slave_1 left promiscuous mode [ 3181.998097][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3182.008617][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3182.019360][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3182.074667][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3182.133647][ T9164] bond0 (unregistering): Released all slaves [ 3182.361294][ T9164] device hsr_slave_0 left promiscuous mode [ 3182.421059][ T9164] device hsr_slave_1 left promiscuous mode [ 3182.477768][ T9164] team0 (unregistering): Port device team_slave_1 removed [ 3182.489048][ T9164] team0 (unregistering): Port device team_slave_0 removed [ 3182.499146][ T9164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3182.564489][ T9164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3182.642479][ T9164] bond0 (unregistering): Released all slaves [ 3182.767893][T25660] IPVS: ftp: loaded support on port[0] = 21 [ 3182.823298][T25657] device hsr_slave_0 entered promiscuous mode [ 3182.891323][T25657] device hsr_slave_1 entered promiscuous mode [ 3182.930996][T25657] debugfs: Directory 'hsr0' with parent '/' already present! [ 3183.005086][T25660] chnl_net:caif_netlink_parms(): no params data found [ 3183.040644][T25660] bridge0: port 1(bridge_slave_0) entered blocking state [ 3183.047855][T25660] bridge0: port 1(bridge_slave_0) entered disabled state [ 3183.055739][T25660] device bridge_slave_0 entered promiscuous mode [ 3183.063565][T25660] bridge0: port 2(bridge_slave_1) entered blocking state [ 3183.070720][T25660] bridge0: port 2(bridge_slave_1) entered disabled state [ 3183.078776][T25660] device bridge_slave_1 entered promiscuous mode [ 3183.097881][T25660] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3183.108797][T25660] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3183.151926][T25660] team0: Port device team_slave_0 added [ 3183.159021][T25660] team0: Port device team_slave_1 added [ 3183.313599][T25660] device hsr_slave_0 entered promiscuous mode [ 3183.363644][T25660] device hsr_slave_1 entered promiscuous mode [ 3183.430963][T25660] debugfs: Directory 'hsr0' with parent '/' already present! [ 3183.448594][T25657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3183.477865][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3183.486191][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3183.498405][T25657] 8021q: adding VLAN 0 to HW filter on device team0 [ 3183.518631][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3183.527641][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3183.540547][T11142] bridge0: port 1(bridge_slave_0) entered blocking state [ 3183.547785][T11142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3183.582554][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3183.591563][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3183.600459][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3183.612926][T24658] bridge0: port 2(bridge_slave_1) entered blocking state [ 3183.620154][T24658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3183.629104][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3183.638355][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3183.647617][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3183.656345][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3183.665238][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3183.673743][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3183.682721][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3183.691248][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3183.705499][T25657] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3183.717239][T25657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3183.731284][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3183.739344][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3183.748233][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3183.767112][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3183.779352][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3183.789931][T25657] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3183.814198][T25660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3183.826375][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3183.839776][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3183.849864][T25660] 8021q: adding VLAN 0 to HW filter on device team0 [ 3183.871958][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3183.885058][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3183.912835][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3183.924588][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3183.933328][T15626] bridge0: port 1(bridge_slave_0) entered blocking state [ 3183.940374][T15626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3183.951462][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3183.960282][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3183.971710][T15626] bridge0: port 2(bridge_slave_1) entered blocking state [ 3183.978793][T15626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3183.988540][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3183.997740][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3184.012458][T25657] device veth0_vlan entered promiscuous mode [ 3184.019162][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3184.027333][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3184.036362][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3184.045262][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3184.054274][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3184.063108][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3184.071221][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3184.079380][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3184.096048][T25657] device veth1_vlan entered promiscuous mode [ 3184.106170][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3184.114621][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3184.123845][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3184.133895][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3184.142638][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3184.151283][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3184.159775][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3184.169435][T25660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3184.195260][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3184.203706][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3184.213254][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3184.225472][T25660] 8021q: adding VLAN 0 to HW filter on device batadv0 16:04:25 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:25 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:25 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:25 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3184.321252][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3184.330121][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3184.409988][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3184.428474][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3184.450831][T25660] device veth0_vlan entered promiscuous mode [ 3184.463962][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3184.495984][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3184.948245][T25660] device veth1_vlan entered promiscuous mode [ 3184.967616][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3185.123765][T24677] tipc: TX() has been purged, node left! 16:04:26 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:26 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:26 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:26 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:26 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:26 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYBLOB=',obj_user=\\,ui', @ANYRESDEC=r6, @ANYBLOB=',\x00']) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x2, {0x2003b, 0x200, 0x7d, 0x1}}) 16:04:27 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:27 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:27 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3187.116083][T24677] device bridge_slave_1 left promiscuous mode [ 3187.125923][T24677] bridge0: port 2(bridge_slave_1) entered disabled state [ 3187.181781][T24677] device bridge_slave_0 left promiscuous mode [ 3187.193969][T24677] bridge0: port 1(bridge_slave_0) entered disabled state [ 3187.266793][T24677] device veth1_vlan left promiscuous mode [ 3187.278868][T24677] device veth0_vlan left promiscuous mode [ 3188.611254][T24677] device hsr_slave_0 left promiscuous mode [ 3188.671037][T24677] device hsr_slave_1 left promiscuous mode [ 3188.727694][T24677] team0 (unregistering): Port device team_slave_1 removed [ 3188.738482][T24677] team0 (unregistering): Port device team_slave_0 removed [ 3188.748970][T24677] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3188.814430][T24677] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3188.874975][T24677] bond0 (unregistering): Released all slaves [ 3188.970364][T25741] IPVS: ftp: loaded support on port[0] = 21 [ 3188.970468][T25743] IPVS: ftp: loaded support on port[0] = 21 [ 3189.077541][T25741] chnl_net:caif_netlink_parms(): no params data found [ 3189.137295][T25743] chnl_net:caif_netlink_parms(): no params data found [ 3189.168256][T25741] bridge0: port 1(bridge_slave_0) entered blocking state [ 3189.177320][T25741] bridge0: port 1(bridge_slave_0) entered disabled state [ 3189.186326][T25741] device bridge_slave_0 entered promiscuous mode [ 3189.208666][T25741] bridge0: port 2(bridge_slave_1) entered blocking state [ 3189.217986][T25741] bridge0: port 2(bridge_slave_1) entered disabled state [ 3189.227206][T25741] device bridge_slave_1 entered promiscuous mode [ 3189.248938][T25743] bridge0: port 1(bridge_slave_0) entered blocking state [ 3189.272847][T25743] bridge0: port 1(bridge_slave_0) entered disabled state [ 3189.291113][T25743] device bridge_slave_0 entered promiscuous mode [ 3189.310446][T25741] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3189.322759][T25743] bridge0: port 2(bridge_slave_1) entered blocking state [ 3189.329838][T25743] bridge0: port 2(bridge_slave_1) entered disabled state [ 3189.351729][T25743] device bridge_slave_1 entered promiscuous mode [ 3189.375163][T25741] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3189.398536][T25743] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3189.409738][T25743] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3189.414415][T25747] IPVS: ftp: loaded support on port[0] = 21 [ 3189.445494][T25741] team0: Port device team_slave_0 added [ 3189.452923][T25743] team0: Port device team_slave_0 added [ 3189.461514][T25741] team0: Port device team_slave_1 added [ 3189.467932][T25743] team0: Port device team_slave_1 added [ 3189.563414][T25741] device hsr_slave_0 entered promiscuous mode [ 3189.593493][T25741] device hsr_slave_1 entered promiscuous mode [ 3189.633371][T25741] debugfs: Directory 'hsr0' with parent '/' already present! [ 3189.703171][T25743] device hsr_slave_0 entered promiscuous mode [ 3189.751386][T25743] device hsr_slave_1 entered promiscuous mode [ 3189.791011][T25743] debugfs: Directory 'hsr0' with parent '/' already present! [ 3189.868968][T25747] chnl_net:caif_netlink_parms(): no params data found [ 3189.906202][T25741] bridge0: port 2(bridge_slave_1) entered blocking state [ 3189.913353][T25741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3189.920652][T25741] bridge0: port 1(bridge_slave_0) entered blocking state [ 3189.927715][T25741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3189.960796][T25743] bridge0: port 2(bridge_slave_1) entered blocking state [ 3189.967921][T25743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3189.975223][T25743] bridge0: port 1(bridge_slave_0) entered blocking state [ 3189.982275][T25743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3190.015939][T25747] bridge0: port 1(bridge_slave_0) entered blocking state [ 3190.023307][T25747] bridge0: port 1(bridge_slave_0) entered disabled state [ 3190.031522][T25747] device bridge_slave_0 entered promiscuous mode [ 3190.055404][T25747] bridge0: port 2(bridge_slave_1) entered blocking state [ 3190.063464][T25747] bridge0: port 2(bridge_slave_1) entered disabled state [ 3190.074470][T25747] device bridge_slave_1 entered promiscuous mode [ 3190.082261][T18056] bridge0: port 1(bridge_slave_0) entered disabled state [ 3190.090242][T18056] bridge0: port 2(bridge_slave_1) entered disabled state [ 3190.098976][T18056] bridge0: port 1(bridge_slave_0) entered disabled state [ 3190.107642][T18056] bridge0: port 2(bridge_slave_1) entered disabled state [ 3190.133217][T25741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3190.164427][T25743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3190.184008][T25747] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3190.196431][T25747] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3190.217579][T25747] team0: Port device team_slave_0 added [ 3190.224735][T25747] team0: Port device team_slave_1 added [ 3190.238526][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3190.246370][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3190.254337][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3190.262484][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3190.272260][T25741] 8021q: adding VLAN 0 to HW filter on device team0 [ 3190.291396][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3190.300288][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3190.309565][T24658] bridge0: port 1(bridge_slave_0) entered blocking state [ 3190.316793][T24658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3190.324778][T13898] tipc: TX() has been purged, node left! [ 3190.332326][T13898] tipc: TX() has been purged, node left! [ 3190.340265][T25743] 8021q: adding VLAN 0 to HW filter on device team0 [ 3190.350546][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3190.359778][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3190.368330][T24658] bridge0: port 2(bridge_slave_1) entered blocking state [ 3190.375566][T24658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3190.384093][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3190.392877][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3190.401966][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3190.410559][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3190.419374][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3190.428004][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3190.436488][T24658] bridge0: port 1(bridge_slave_0) entered blocking state [ 3190.443543][T24658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3190.503571][T25747] device hsr_slave_0 entered promiscuous mode [ 3190.541553][T25747] device hsr_slave_1 entered promiscuous mode [ 3190.580991][T25747] debugfs: Directory 'hsr0' with parent '/' already present! [ 3190.588643][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3190.597365][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3190.606182][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3190.614413][T24658] bridge0: port 2(bridge_slave_1) entered blocking state [ 3190.621629][T24658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3190.629841][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3190.638656][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3190.647523][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3190.656405][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3190.664940][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3190.673684][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3190.683429][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3190.691888][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3190.701497][T25741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3190.828788][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3190.837511][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3190.846964][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3190.856186][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3190.865030][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3190.875807][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3190.884694][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3190.897072][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3190.906303][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3190.920537][T25741] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3190.934416][T25743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3190.946462][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3190.954346][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3191.039731][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3191.048374][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3191.112254][T25743] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3191.137694][T25747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3191.210323][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3191.219559][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3191.241780][T25747] 8021q: adding VLAN 0 to HW filter on device team0 [ 3191.249528][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3191.258603][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3191.322005][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3191.330466][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3191.339608][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3191.348587][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3191.357129][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3191.364285][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3191.374013][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3191.382357][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3191.390216][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3191.399075][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3191.408341][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3191.417030][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state [ 3191.424147][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3191.434275][T25741] device veth0_vlan entered promiscuous mode [ 3191.499294][T25747] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3191.510068][T25747] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3191.527044][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3191.536315][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3191.545575][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3191.554704][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3191.563656][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3191.573213][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3191.582314][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3191.590850][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3191.599385][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3191.608210][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3191.616842][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3191.625044][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3191.699730][T25741] device veth1_vlan entered promiscuous mode [ 3191.708187][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3191.718993][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3191.727829][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3191.749575][T25743] device veth0_vlan entered promiscuous mode [ 3191.809829][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3191.818268][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3191.827128][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3191.836848][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3191.846323][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3191.935839][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3191.945537][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3191.957832][T25747] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3191.986063][T25743] device veth1_vlan entered promiscuous mode [ 3192.002407][T13898] device bridge_slave_1 left promiscuous mode [ 3192.008959][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 3192.061714][T13898] device bridge_slave_0 left promiscuous mode [ 3192.067922][T13898] bridge0: port 1(bridge_slave_0) entered disabled state 16:04:33 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:33 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:33 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYBLOB=',obj_user=\\,', @ANYRESDEC=r6, @ANYBLOB=',\x00']) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x2, {0x2003b, 0x200, 0x7d, 0x1}}) 16:04:33 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3192.124941][T13898] device bridge_slave_1 left promiscuous mode [ 3192.141054][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 3192.181713][T13898] device bridge_slave_0 left promiscuous mode [ 3192.188059][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 3192.267783][T13898] device veth1_vlan left promiscuous mode [ 3192.341913][T13898] device veth0_vlan left promiscuous mode [ 3192.381190][T13898] device veth1_vlan left promiscuous mode [ 3192.387159][T13898] device veth0_vlan left promiscuous mode 16:04:33 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3194.981524][T13898] device hsr_slave_0 left promiscuous mode [ 3195.021136][T13898] device hsr_slave_1 left promiscuous mode [ 3195.067338][T13898] team0 (unregistering): Port device team_slave_1 removed [ 3195.078208][T13898] team0 (unregistering): Port device team_slave_0 removed [ 3195.089841][T13898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3195.134757][T13898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3195.226377][T13898] bond0 (unregistering): Released all slaves [ 3195.451556][T13898] device hsr_slave_0 left promiscuous mode [ 3195.531516][T13898] device hsr_slave_1 left promiscuous mode [ 3195.578330][T13898] team0 (unregistering): Port device team_slave_1 removed [ 3195.589406][T13898] team0 (unregistering): Port device team_slave_0 removed [ 3195.600882][T13898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3195.655301][T13898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3195.736316][T13898] bond0 (unregistering): Released all slaves [ 3195.837231][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3195.851995][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3195.866790][T25801] IPVS: ftp: loaded support on port[0] = 21 16:04:36 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:36 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:37 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3195.996021][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3196.006391][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3196.075003][T25747] device veth0_vlan entered promiscuous mode [ 3196.131118][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3196.139882][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3196.162725][T25801] chnl_net:caif_netlink_parms(): no params data found [ 3196.176339][T25747] device veth1_vlan entered promiscuous mode 16:04:37 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3196.372560][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3196.383520][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3196.436436][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3196.590142][T25801] bridge0: port 1(bridge_slave_0) entered blocking state [ 3196.655197][T25801] bridge0: port 1(bridge_slave_0) entered disabled state [ 3196.693394][T25801] device bridge_slave_0 entered promiscuous mode [ 3196.743516][T25801] bridge0: port 2(bridge_slave_1) entered blocking state [ 3196.791517][T25801] bridge0: port 2(bridge_slave_1) entered disabled state 16:04:37 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:37 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:37 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0) [ 3196.842880][T25801] device bridge_slave_1 entered promiscuous mode [ 3196.862065][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3196.924755][T25801] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3196.998705][T25801] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3197.122228][T25801] team0: Port device team_slave_0 added [ 3197.276386][T25801] team0: Port device team_slave_1 added [ 3197.423252][T25801] device hsr_slave_0 entered promiscuous mode [ 3197.488475][T25801] device hsr_slave_1 entered promiscuous mode [ 3197.861865][T25801] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3197.887080][T24658] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3197.933343][T25801] 8021q: adding VLAN 0 to HW filter on device team0 [ 3197.954372][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3197.962456][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3197.996022][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3198.016979][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3198.044361][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3198.053148][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3198.075177][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3198.091632][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3198.124460][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state [ 3198.132619][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3198.164639][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3198.193998][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3198.216120][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3198.239886][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3198.253638][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3198.265319][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3198.276876][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3198.288886][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3198.300079][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3198.314384][T25801] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3198.329670][T25801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3198.338415][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3198.351310][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3198.360400][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3198.382216][T25801] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3198.397776][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3198.416758][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3198.474231][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3198.485175][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3198.498634][T25801] device veth0_vlan entered promiscuous mode [ 3198.508249][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3198.517391][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3198.527426][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3198.536002][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3198.547768][T25801] device veth1_vlan entered promiscuous mode [ 3198.594387][T13898] tipc: TX() has been purged, node left! 16:04:39 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) 16:04:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:39 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:39 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:39 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3198.770954][T13898] tipc: TX() has been purged, node left! [ 3198.871673][T13898] tipc: TX() has been purged, node left! 16:04:40 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3199.153992][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3199.169036][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:04:40 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:40 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:40 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 3200.150348][T25881] IPVS: ftp: loaded support on port[0] = 21 [ 3200.607197][T25881] chnl_net:caif_netlink_parms(): no params data found [ 3200.809345][T25881] bridge0: port 1(bridge_slave_0) entered blocking state [ 3200.820021][T25881] bridge0: port 1(bridge_slave_0) entered disabled state [ 3200.828609][T25881] device bridge_slave_0 entered promiscuous mode [ 3200.842636][T25881] bridge0: port 2(bridge_slave_1) entered blocking state [ 3200.850427][T25881] bridge0: port 2(bridge_slave_1) entered disabled state [ 3200.863378][T25881] device bridge_slave_1 entered promiscuous mode [ 3201.056076][T25881] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3201.083656][T25881] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3201.187388][T25881] team0: Port device team_slave_0 added [ 3201.194508][T25881] team0: Port device team_slave_1 added [ 3201.263500][T25881] device hsr_slave_0 entered promiscuous mode [ 3201.311338][T25881] device hsr_slave_1 entered promiscuous mode [ 3201.351059][T25881] debugfs: Directory 'hsr0' with parent '/' already present! [ 3201.432231][T25888] IPVS: ftp: loaded support on port[0] = 21 [ 3201.469508][T13898] device bridge_slave_1 left promiscuous mode [ 3201.475808][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 3201.521768][T13898] device bridge_slave_0 left promiscuous mode [ 3201.527978][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 3201.573745][T13898] device bridge_slave_1 left promiscuous mode [ 3201.580020][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 3201.621764][T13898] device bridge_slave_0 left promiscuous mode [ 3201.628004][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 3201.664395][T13898] device bridge_slave_1 left promiscuous mode [ 3201.670748][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 3201.721848][T13898] device bridge_slave_0 left promiscuous mode [ 3201.728097][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 3201.787464][T13898] device veth1_vlan left promiscuous mode [ 3201.793417][T13898] device veth0_vlan left promiscuous mode [ 3201.799356][T13898] device veth1_vlan left promiscuous mode [ 3201.805222][T13898] device veth0_vlan left promiscuous mode [ 3201.811268][T13898] device veth1_vlan left promiscuous mode [ 3201.817036][T13898] device veth0_vlan left promiscuous mode [ 3204.291683][T13898] device hsr_slave_0 left promiscuous mode [ 3204.351088][T13898] device hsr_slave_1 left promiscuous mode [ 3204.418180][T13898] team0 (unregistering): Port device team_slave_1 removed [ 3204.429111][T13898] team0 (unregistering): Port device team_slave_0 removed [ 3204.439635][T13898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3204.495325][T13898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3204.555001][T13898] bond0 (unregistering): Released all slaves [ 3204.731403][T13898] device hsr_slave_0 left promiscuous mode [ 3204.771349][T13898] device hsr_slave_1 left promiscuous mode [ 3204.817874][T13898] team0 (unregistering): Port device team_slave_1 removed [ 3204.828070][T13898] team0 (unregistering): Port device team_slave_0 removed [ 3204.838371][T13898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3204.884565][T13898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3204.944530][T13898] bond0 (unregistering): Released all slaves [ 3205.111409][T13898] device hsr_slave_0 left promiscuous mode [ 3205.171066][T13898] device hsr_slave_1 left promiscuous mode [ 3205.247354][T13898] team0 (unregistering): Port device team_slave_1 removed [ 3205.258893][T13898] team0 (unregistering): Port device team_slave_0 removed [ 3205.269046][T13898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3205.314823][T13898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3205.383333][T13898] bond0 (unregistering): Released all slaves [ 3205.488227][T25890] IPVS: ftp: loaded support on port[0] = 21 [ 3205.578280][T25888] chnl_net:caif_netlink_parms(): no params data found [ 3205.628453][T25890] chnl_net:caif_netlink_parms(): no params data found [ 3205.660470][T25881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3205.686847][T25888] bridge0: port 1(bridge_slave_0) entered blocking state [ 3205.694351][T25888] bridge0: port 1(bridge_slave_0) entered disabled state [ 3205.702149][T25888] device bridge_slave_0 entered promiscuous mode [ 3205.709660][T25888] bridge0: port 2(bridge_slave_1) entered blocking state [ 3205.716811][T25888] bridge0: port 2(bridge_slave_1) entered disabled state [ 3205.724861][T25888] device bridge_slave_1 entered promiscuous mode [ 3205.732461][T25890] bridge0: port 1(bridge_slave_0) entered blocking state [ 3205.739609][T25890] bridge0: port 1(bridge_slave_0) entered disabled state [ 3205.747840][T25890] device bridge_slave_0 entered promiscuous mode [ 3205.755397][T25890] bridge0: port 2(bridge_slave_1) entered blocking state [ 3205.762594][T25890] bridge0: port 2(bridge_slave_1) entered disabled state [ 3205.770594][T25890] device bridge_slave_1 entered promiscuous mode [ 3205.799555][T25881] 8021q: adding VLAN 0 to HW filter on device team0 [ 3205.808892][T25888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3205.821411][T25890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3205.832003][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3205.839682][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3205.862922][T25888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3205.875757][T25890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3205.885768][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3205.894412][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3205.903199][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3205.910653][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3205.918647][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3205.927463][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3205.935880][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state [ 3205.942920][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3205.950640][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3205.960263][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3205.969305][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3205.977941][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3205.986673][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3205.995303][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3206.003950][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3206.012381][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3206.021468][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3206.030018][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3206.038501][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3206.046676][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3206.152080][T25890] team0: Port device team_slave_0 added [ 3206.159332][T25881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3206.212574][T25890] team0: Port device team_slave_1 added [ 3206.232790][T25888] team0: Port device team_slave_0 added [ 3206.255631][T25888] team0: Port device team_slave_1 added [ 3206.314412][T25890] device hsr_slave_0 entered promiscuous mode [ 3206.363558][T25890] device hsr_slave_1 entered promiscuous mode [ 3206.403095][T25890] debugfs: Directory 'hsr0' with parent '/' already present! [ 3206.429561][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3206.451407][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3206.523257][T25888] device hsr_slave_0 entered promiscuous mode [ 3206.561264][T25888] device hsr_slave_1 entered promiscuous mode [ 3206.601274][T25888] debugfs: Directory 'hsr0' with parent '/' already present! [ 3206.614025][T25881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3206.720981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3206.730020][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3206.764829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3206.776311][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3206.786522][T25881] device veth0_vlan entered promiscuous mode [ 3206.803852][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3206.814882][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3206.826398][T25881] device veth1_vlan entered promiscuous mode [ 3206.838601][T25890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3206.868532][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3206.886873][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3206.895354][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3206.903534][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3206.914334][T25890] 8021q: adding VLAN 0 to HW filter on device team0 [ 3206.948741][T25888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3206.996820][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3207.021363][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3207.029848][ T9981] bridge0: port 1(bridge_slave_0) entered blocking state [ 3207.037008][ T9981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3207.045225][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3207.068191][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3207.077387][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3207.086634][ T9981] bridge0: port 2(bridge_slave_1) entered blocking state 16:04:48 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:48 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:48 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x0, 0xd5}, {0x8, 0xfeb}]}, 0x14, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x244800, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB=',\x00']) creat(&(0x7f0000000000)='./bus\x00', 0x0) 16:04:48 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3207.093784][ T9981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3207.111042][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3207.118980][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3207.157579][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3207.187713][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3207.219317][T25888] 8021q: adding VLAN 0 to HW filter on device team0 [ 3207.239631][T25890] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3207.265796][T25890] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3207.294624][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3207.308110][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 16:04:48 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3207.337113][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3207.363926][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3207.402098][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3207.421569][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3207.454993][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3207.474368][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3207.501785][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3207.521795][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3207.557194][T17599] bridge0: port 1(bridge_slave_0) entered blocking state [ 3207.564406][T17599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3207.610733][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3207.641778][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3207.650161][T17599] bridge0: port 2(bridge_slave_1) entered blocking state [ 3207.657362][T17599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3207.707664][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3207.716160][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3207.724604][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3207.882429][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3207.914551][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3207.944340][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3207.971945][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3208.000980][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3208.009624][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3208.031986][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3208.040609][T11142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3208.061928][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3208.079025][T25888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3208.101412][T25888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3208.115896][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3208.123709][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3208.141254][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3208.164619][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3208.179255][T25890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3208.207275][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3208.221192][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3208.233741][T25888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3208.341143][T13898] tipc: TX() has been purged, node left! [ 3208.347129][T13898] tipc: TX() has been purged, node left! [ 3208.349036][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3208.365148][T13898] tipc: TX() has been purged, node left! [ 3208.372338][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3208.398486][T25888] device veth0_vlan entered promiscuous mode [ 3208.409736][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3208.419170][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3208.428922][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3208.438271][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3208.448182][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3208.475146][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3208.803605][T25888] device veth1_vlan entered promiscuous mode [ 3208.811308][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3208.819741][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3208.828606][ T9606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3208.839637][T25890] device veth0_vlan entered promiscuous mode [ 3209.046644][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3209.064526][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3209.089512][T25890] device veth1_vlan entered promiscuous mode 16:04:50 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:50 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:50 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:04:50 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3209.728495][T25940] IPVS: ftp: loaded support on port[0] = 21 16:04:50 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:51 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:51 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3210.987187][T25969] IPVS: ftp: loaded support on port[0] = 21 [ 3211.595940][T25940] chnl_net:caif_netlink_parms(): no params data found [ 3211.706303][T25969] chnl_net:caif_netlink_parms(): no params data found [ 3211.739594][T25969] bridge0: port 1(bridge_slave_0) entered blocking state [ 3211.746710][T25969] bridge0: port 1(bridge_slave_0) entered disabled state [ 3211.755006][T25969] device bridge_slave_0 entered promiscuous mode [ 3211.765175][T13898] device bridge_slave_1 left promiscuous mode [ 3211.771462][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 3211.821582][T13898] device bridge_slave_0 left promiscuous mode [ 3211.827832][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 3211.893370][T13898] device bridge_slave_1 left promiscuous mode [ 3211.899722][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 3211.951756][T13898] device bridge_slave_0 left promiscuous mode [ 3211.957980][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 3211.994376][T13898] device bridge_slave_1 left promiscuous mode [ 3212.000648][T13898] bridge0: port 2(bridge_slave_1) entered disabled state [ 3212.031563][T13898] device bridge_slave_0 left promiscuous mode [ 3212.037789][T13898] bridge0: port 1(bridge_slave_0) entered disabled state [ 3212.117637][T13898] device veth1_vlan left promiscuous mode [ 3212.123509][T13898] device veth0_vlan left promiscuous mode [ 3212.129355][T13898] device veth1_vlan left promiscuous mode [ 3212.135164][T13898] device veth0_vlan left promiscuous mode [ 3212.141222][T13898] device veth1_vlan left promiscuous mode [ 3212.147039][T13898] device veth0_vlan left promiscuous mode [ 3214.691223][T13898] device hsr_slave_0 left promiscuous mode [ 3214.741151][T13898] device hsr_slave_1 left promiscuous mode [ 3214.788212][T13898] team0 (unregistering): Port device team_slave_1 removed [ 3214.798952][T13898] team0 (unregistering): Port device team_slave_0 removed [ 3214.809749][T13898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3214.844884][T13898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3214.934542][T13898] bond0 (unregistering): Released all slaves [ 3215.141294][T13898] device hsr_slave_0 left promiscuous mode [ 3215.181088][T13898] device hsr_slave_1 left promiscuous mode [ 3215.227967][T13898] team0 (unregistering): Port device team_slave_1 removed [ 3215.238165][T13898] team0 (unregistering): Port device team_slave_0 removed [ 3215.248207][T13898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3215.285359][T13898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3215.363839][T13898] bond0 (unregistering): Released all slaves [ 3215.571561][T13898] device hsr_slave_0 left promiscuous mode [ 3215.631070][T13898] device hsr_slave_1 left promiscuous mode [ 3215.688517][T13898] team0 (unregistering): Port device team_slave_1 removed [ 3215.699086][T13898] team0 (unregistering): Port device team_slave_0 removed [ 3215.709888][T13898] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3215.745356][T13898] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3215.814018][T13898] bond0 (unregistering): Released all slaves [ 3215.923539][T25940] bridge0: port 1(bridge_slave_0) entered blocking state [ 3215.930598][T25940] bridge0: port 1(bridge_slave_0) entered disabled state [ 3215.941563][T25940] device bridge_slave_0 entered promiscuous mode [ 3215.949608][T25969] bridge0: port 2(bridge_slave_1) entered blocking state [ 3215.956820][T25969] bridge0: port 2(bridge_slave_1) entered disabled state [ 3215.965251][T25969] device bridge_slave_1 entered promiscuous mode [ 3215.973918][T25940] bridge0: port 2(bridge_slave_1) entered blocking state [ 3215.981480][T25940] bridge0: port 2(bridge_slave_1) entered disabled state [ 3215.989066][T25940] device bridge_slave_1 entered promiscuous mode [ 3216.013879][T25969] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3216.028893][T25969] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3216.042609][T25983] IPVS: ftp: loaded support on port[0] = 21 [ 3216.046233][T25940] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3216.069276][T25940] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3216.086641][T25969] team0: Port device team_slave_0 added [ 3216.103245][T25940] team0: Port device team_slave_0 added [ 3216.113559][T25969] team0: Port device team_slave_1 added [ 3216.122172][T25940] team0: Port device team_slave_1 added [ 3216.162791][T25969] device hsr_slave_0 entered promiscuous mode [ 3216.201429][T25969] device hsr_slave_1 entered promiscuous mode [ 3216.323460][T25940] device hsr_slave_0 entered promiscuous mode [ 3216.351438][T25940] device hsr_slave_1 entered promiscuous mode [ 3216.401055][T25940] debugfs: Directory 'hsr0' with parent '/' already present! [ 3216.496127][T25983] chnl_net:caif_netlink_parms(): no params data found [ 3216.699843][T25983] bridge0: port 1(bridge_slave_0) entered blocking state [ 3216.710156][T25983] bridge0: port 1(bridge_slave_0) entered disabled state [ 3216.718635][T25983] device bridge_slave_0 entered promiscuous mode [ 3216.734325][T25969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3216.748969][T25983] bridge0: port 2(bridge_slave_1) entered blocking state [ 3216.757039][T25983] bridge0: port 2(bridge_slave_1) entered disabled state [ 3216.769412][T25983] device bridge_slave_1 entered promiscuous mode [ 3216.791495][T25969] 8021q: adding VLAN 0 to HW filter on device team0 [ 3216.800379][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3216.819065][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3216.830594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3216.842898][T25940] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3216.866818][T25983] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3216.892924][T25983] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3216.916778][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3216.930156][T25940] 8021q: adding VLAN 0 to HW filter on device team0 [ 3216.947572][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3216.958936][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3216.967251][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3216.978881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3216.987677][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 3216.994814][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3217.013317][T25983] team0: Port device team_slave_0 added [ 3217.020353][T25983] team0: Port device team_slave_1 added [ 3217.044992][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3217.056895][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3217.065748][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3217.077228][ T8055] bridge0: port 1(bridge_slave_0) entered blocking state [ 3217.084305][ T8055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3217.106625][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3217.117676][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3217.126574][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3217.137974][ T8055] bridge0: port 2(bridge_slave_1) entered blocking state [ 3217.145254][ T8055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3217.153939][ T8055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3217.191090][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3217.199883][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3217.209602][T17599] bridge0: port 2(bridge_slave_1) entered blocking state [ 3217.216695][T17599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3217.225357][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3217.234228][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3217.243799][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3217.252640][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3217.261770][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3217.270478][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3217.279510][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3217.287971][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3217.296517][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3217.305535][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3217.314311][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3217.323670][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3217.332593][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3217.346984][T25969] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3217.357728][T25969] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3217.413028][T25983] device hsr_slave_0 entered promiscuous mode [ 3217.461713][T25983] device hsr_slave_1 entered promiscuous mode [ 3217.501060][T25983] debugfs: Directory 'hsr0' with parent '/' already present! [ 3217.526370][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3217.535136][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3217.545196][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3217.553642][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3217.562379][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3217.570666][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3217.579017][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3217.587459][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3217.595889][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3217.611669][T25940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3217.634002][T25969] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3217.651667][T25940] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3217.659276][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3217.674304][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3217.686104][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3217.701228][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3217.769333][T25983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3217.796523][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3217.808336][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3217.828933][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3217.852101][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3217.861740][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3217.871495][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3217.881581][T25983] 8021q: adding VLAN 0 to HW filter on device team0 [ 3217.900801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3217.909729][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3217.918277][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 3217.925486][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3217.934376][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3217.951220][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3217.959776][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3217.969003][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3217.977000][ T9981] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3217.997052][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3218.005890][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3218.014945][T17599] bridge0: port 2(bridge_slave_1) entered blocking state [ 3218.022057][T17599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3218.030305][T25969] device veth0_vlan entered promiscuous mode [ 3218.044031][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3218.054948][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3218.064626][T15626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3218.076191][T25940] device veth0_vlan entered promiscuous mode [ 3218.089824][T25940] device veth1_vlan entered promiscuous mode [ 3218.105911][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3218.114164][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3218.122350][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3218.140664][T25969] device veth1_vlan entered promiscuous mode [ 3218.151817][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3218.160468][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3218.175080][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3218.195549][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3218.209868][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3218.236881][T25983] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3218.281015][T25983] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3218.303367][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3218.312289][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3218.321209][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3218.329606][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3218.334052][ T45] tipc: TX() has been purged, node left! [ 3218.348502][ T45] tipc: TX() has been purged, node left! [ 3218.362980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3218.382849][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3218.414116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3218.431144][T25983] 8021q: adding VLAN 0 to HW filter on device batadv0 16:04:59 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:59 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:59 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:59 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:04:59 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3219.366451][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3219.379533][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3219.525278][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3219.536780][T23321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3219.549308][T25983] device veth0_vlan entered promiscuous mode [ 3219.694175][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3219.711841][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3219.848753][T25983] device veth1_vlan entered promiscuous mode 16:05:01 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:05:01 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:05:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:05:01 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) [ 3220.311208][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3220.346204][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 16:05:01 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:05:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={0x0, r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312c7569643d2235b8b9ba43ec3203e22ce57294cdbedb67dad63a207eeb969fa02beaf28f128171827e584dfe85c5c57a771749eea317f144b667be631373594bcdd6dcb7570239be6763a6f882fef3f0727493c68cf5a08eedc1dcb7bd050a7619023f27c57018", @ANYRESDEC, @ANYBLOB=',Tt]>3', @ANYRESDEC=r3, @ANYRESDEC, @ANYBLOB=',\x00']) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x46000) 16:05:01 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) 16:05:02 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x310000, 0x2b42969e38fbe390) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x40000000, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(0x0, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRESDEC=r2, @ANYBLOB=',Tt]>3', @ANYRESDEC=r4, @ANYRESDEC, @ANYBLOB=',\x00']) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) [ 3221.244030][ T45] device bridge_slave_1 left promiscuous mode [ 3221.251747][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3221.291576][ T45] device bridge_slave_0 left promiscuous mode [ 3221.298077][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3221.374183][ T45] device bridge_slave_1 left promiscuous mode [ 3221.380475][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 3221.451498][ T45] device bridge_slave_0 left promiscuous mode [ 3221.457844][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 3221.551259][ T45] device veth1_vlan left promiscuous mode [ 3221.557168][ T45] device veth0_vlan left promiscuous mode [ 3221.564714][ T45] device veth1_vlan left promiscuous mode [ 3221.581015][ T45] device veth0_vlan left promiscuous mode [ 3223.691469][ T45] device hsr_slave_0 left promiscuous mode [ 3223.731046][ T45] device hsr_slave_1 left promiscuous mode [ 3223.778203][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3223.788950][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3223.799830][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3223.824505][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3223.915379][ T45] bond0 (unregistering): Released all slaves [ 3224.131448][ T45] device hsr_slave_0 left promiscuous mode [ 3224.191128][ T45] device hsr_slave_1 left promiscuous mode [ 3224.257925][ T45] team0 (unregistering): Port device team_slave_1 removed [ 3224.268785][ T45] team0 (unregistering): Port device team_slave_0 removed [ 3224.279602][ T45] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3224.304660][ T45] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3224.386434][ T45] bond0 (unregistering): Released all slaves [ 3224.488467][T26057] IPVS: ftp: loaded support on port[0] = 21 [ 3224.503797][T26063] IPVS: ftp: loaded support on port[0] = 21 [ 3224.505569][T26060] IPVS: ftp: loaded support on port[0] = 21 [ 3224.517221][T26064] IPVS: ftp: loaded support on port[0] = 21 [ 3224.704530][T26064] chnl_net:caif_netlink_parms(): no params data found [ 3224.743893][T26063] chnl_net:caif_netlink_parms(): no params data found [ 3224.753280][T26057] chnl_net:caif_netlink_parms(): no params data found [ 3224.783866][T26060] chnl_net:caif_netlink_parms(): no params data found [ 3224.804884][T26064] bridge0: port 1(bridge_slave_0) entered blocking state [ 3224.812029][T26064] bridge0: port 1(bridge_slave_0) entered disabled state [ 3224.819922][T26064] device bridge_slave_0 entered promiscuous mode [ 3224.830165][T26064] bridge0: port 2(bridge_slave_1) entered blocking state [ 3224.837305][T26064] bridge0: port 2(bridge_slave_1) entered disabled state [ 3224.845255][T26064] device bridge_slave_1 entered promiscuous mode [ 3224.866508][T26064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3224.885214][T26057] bridge0: port 1(bridge_slave_0) entered blocking state [ 3224.892372][T26057] bridge0: port 1(bridge_slave_0) entered disabled state [ 3224.900551][T26057] device bridge_slave_0 entered promiscuous mode [ 3224.909421][T26064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3224.924318][T26057] bridge0: port 2(bridge_slave_1) entered blocking state [ 3224.932952][T26057] bridge0: port 2(bridge_slave_1) entered disabled state [ 3224.941096][T26057] device bridge_slave_1 entered promiscuous mode [ 3225.072091][T26064] team0: Port device team_slave_0 added [ 3225.095364][T26057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3225.110571][T26064] team0: Port device team_slave_1 added [ 3225.121041][T26063] bridge0: port 1(bridge_slave_0) entered blocking state [ 3225.128190][T26063] bridge0: port 1(bridge_slave_0) entered disabled state [ 3225.145904][T26063] device bridge_slave_0 entered promiscuous mode [ 3225.155153][T26057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3225.164311][T26060] bridge0: port 1(bridge_slave_0) entered blocking state [ 3225.171837][T26060] bridge0: port 1(bridge_slave_0) entered disabled state [ 3225.180417][T26060] device bridge_slave_0 entered promiscuous mode [ 3225.189101][T26060] bridge0: port 2(bridge_slave_1) entered blocking state [ 3225.196821][T26060] bridge0: port 2(bridge_slave_1) entered disabled state [ 3225.205056][T26060] device bridge_slave_1 entered promiscuous mode [ 3225.212093][T26063] bridge0: port 2(bridge_slave_1) entered blocking state [ 3225.219911][T26063] bridge0: port 2(bridge_slave_1) entered disabled state [ 3225.228265][T26063] device bridge_slave_1 entered promiscuous mode [ 3225.278653][T26063] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3225.294844][T26060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3225.319443][T26057] team0: Port device team_slave_0 added [ 3225.327351][T26063] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3225.338932][T26060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3225.403370][T26064] device hsr_slave_0 entered promiscuous mode [ 3225.451676][T26064] device hsr_slave_1 entered promiscuous mode [ 3225.521050][T26064] debugfs: Directory 'hsr0' with parent '/' already present! [ 3225.529532][T26057] team0: Port device team_slave_1 added [ 3225.546933][T26060] team0: Port device team_slave_0 added [ 3225.554624][T26060] team0: Port device team_slave_1 added [ 3225.606140][T26063] team0: Port device team_slave_0 added [ 3225.667638][T26057] device hsr_slave_0 entered promiscuous mode [ 3225.721332][T26057] device hsr_slave_1 entered promiscuous mode [ 3225.761008][T26057] debugfs: Directory 'hsr0' with parent '/' already present! [ 3225.774694][T26063] team0: Port device team_slave_1 added [ 3225.813510][T26060] device hsr_slave_0 entered promiscuous mode [ 3225.851477][T26060] device hsr_slave_1 entered promiscuous mode [ 3225.891141][T26060] debugfs: Directory 'hsr0' with parent '/' already present! [ 3225.974070][T26063] device hsr_slave_0 entered promiscuous mode [ 3226.021502][T26063] device hsr_slave_1 entered promiscuous mode [ 3226.081140][T26063] debugfs: Directory 'hsr0' with parent '/' already present! [ 3226.195730][T26064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3226.214831][T26063] ================================================================== [ 3226.223320][T26063] BUG: KCSAN: data-race in del_timer / enqueue_timer [ 3226.229982][T26063] [ 3226.232298][T26063] write to 0xffffffff85e130a8 of 8 bytes by task 18056 on cpu 0: [ 3226.240011][T26063] enqueue_timer+0x9c/0x210 [ 3226.244501][T26063] __internal_add_timer+0x4f/0x60 [ 3226.249767][T26063] add_timer+0x250/0x550 [ 3226.254078][T26063] __queue_delayed_work+0x13b/0x1d0 [ 3226.259384][T26063] queue_delayed_work_on+0xf3/0x110 [ 3226.264581][T26063] check_lifetime+0x325/0x5a0 [ 3226.269264][T26063] process_one_work+0x3d4/0x890 [ 3226.274145][T26063] worker_thread+0xa0/0x800 [ 3226.278726][T26063] kthread+0x1d4/0x200 [ 3226.282973][T26063] ret_from_fork+0x1f/0x30 [ 3226.287396][T26063] [ 3226.289755][T26063] read to 0xffffffff85e130a8 of 8 bytes by task 26063 on cpu 1: [ 3226.297376][T26063] del_timer+0x3b/0xb0 [ 3226.301520][T26063] try_to_grab_pending+0x22d/0x3e0 [ 3226.306613][T26063] cancel_delayed_work+0x45/0x1c0 [ 3226.311619][T26063] __inet_insert_ifa+0x4a1/0x650 [ 3226.316557][T26063] inet_rtm_newaddr+0x8a5/0xaa0 [ 3226.321405][T26063] rtnetlink_rcv_msg+0x1d3/0x500 [ 3226.326420][T26063] netlink_rcv_skb+0xb0/0x260 [ 3226.331084][T26063] rtnetlink_rcv+0x26/0x30 [ 3226.335480][T26063] netlink_unicast+0x3a6/0x4d0 [ 3226.340324][T26063] netlink_sendmsg+0x4d3/0x8b0 [ 3226.345081][T26063] sock_sendmsg+0x9f/0xc0 [ 3226.349402][T26063] __sys_sendto+0x21f/0x320 [ 3226.353889][T26063] __x64_sys_sendto+0x89/0xb0 [ 3226.358547][T26063] do_syscall_64+0xcc/0x3a0 [ 3226.363038][T26063] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3226.368914][T26063] [ 3226.371240][T26063] Reported by Kernel Concurrency Sanitizer on: [ 3226.377406][T26063] CPU: 1 PID: 26063 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 3226.386062][T26063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3226.396114][T26063] ================================================================== [ 3226.404165][T26063] Kernel panic - not syncing: panic_on_warn set ... [ 3226.410819][T26063] CPU: 1 PID: 26063 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 3226.419477][T26063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3226.429522][T26063] Call Trace: [ 3226.432811][T26063] dump_stack+0x11d/0x181 [ 3226.437143][T26063] panic+0x210/0x640 [ 3226.441033][T26063] ? vprintk_func+0x8d/0x140 [ 3226.445610][T26063] kcsan_report.cold+0xc/0xd [ 3226.450194][T26063] kcsan_setup_watchpoint+0x3fe/0x460 [ 3226.455548][T26063] __tsan_read8+0xc6/0x100 [ 3226.459946][T26063] del_timer+0x3b/0xb0 [ 3226.464001][T26063] try_to_grab_pending+0x22d/0x3e0 [ 3226.469097][T26063] ? find_next_bit+0xcb/0xe0 [ 3226.473672][T26063] cancel_delayed_work+0x45/0x1c0 [ 3226.478684][T26063] __inet_insert_ifa+0x4a1/0x650 [ 3226.483608][T26063] inet_rtm_newaddr+0x8a5/0xaa0 [ 3226.488462][T26063] ? __mutex_lock.isra.0+0x2fd/0x740 [ 3226.493746][T26063] ? inet_set_link_af+0x1f0/0x1f0 [ 3226.498761][T26063] rtnetlink_rcv_msg+0x1d3/0x500 [ 3226.503692][T26063] ? rtnetlink_rcv_msg+0x1d3/0x500 [ 3226.508788][T26063] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 3226.514495][T26063] ? __rcu_read_unlock+0x66/0x3d0 [ 3226.519508][T26063] netlink_rcv_skb+0xb0/0x260 [ 3226.524285][T26063] ? rtnl_calcit.isra.0+0x220/0x220 [ 3226.529513][T26063] rtnetlink_rcv+0x26/0x30 [ 3226.533922][T26063] netlink_unicast+0x3a6/0x4d0 [ 3226.538724][T26063] netlink_sendmsg+0x4d3/0x8b0 [ 3226.543541][T26063] ? netlink_unicast+0x4d0/0x4d0 [ 3226.548573][T26063] sock_sendmsg+0x9f/0xc0 [ 3226.552894][T26063] __sys_sendto+0x21f/0x320 [ 3226.557394][T26063] ? blkcg_maybe_throttle_current+0x23d/0x580 [ 3226.563468][T26063] ? _raw_spin_unlock_irq+0x68/0x80 [ 3226.568653][T26063] ? mem_cgroup_handle_over_high+0x50/0x180 [ 3226.574535][T26063] __x64_sys_sendto+0x89/0xb0 [ 3226.579199][T26063] do_syscall_64+0xcc/0x3a0 [ 3226.583699][T26063] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3226.589571][T26063] RIP: 0033:0x414c43 [ 3226.593470][T26063] Code: ff 0f 83 b0 19 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 2d 38 66 00 00 75 17 49 89 ca b8 2c 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 81 19 00 00 c3 48 83 ec 08 e8 87 fa ff ff [ 3226.613345][T26063] RSP: 002b:00007ffdae5f5328 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 3226.621994][T26063] RAX: ffffffffffffffda RBX: 0000000000a72200 RCX: 0000000000414c43 [ 3226.629978][T26063] RDX: 0000000000000028 RSI: 0000000000a72250 RDI: 0000000000000003 [ 3226.638042][T26063] RBP: 0000000000000000 R08: 00007ffdae5f5330 R09: 000000000000000c [ 3226.645996][T26063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3226.654290][T26063] R13: 0000000000000000 R14: 0000000000a72250 R15: 0000000000000003 [ 3226.663865][T26063] Kernel Offset: disabled [ 3226.668396][T26063] Rebooting in 86400 seconds..