, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:38 executing program 1: 23:55:38 executing program 1: [ 568.219448] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11614 comm=syz-executor.4 23:55:38 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000100)=""/149, 0x95) 23:55:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81df4e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:38 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:38 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x2}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:39 executing program 1: 23:55:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22020ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:39 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:39 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000100)=""/149, 0x207a0cb3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000000)=0x54) 23:55:39 executing program 1: socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 568.741765] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:55:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:39 executing program 2: socketpair(0x9, 0x1, 0x13, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000000c0)=0x8, &(0x7f0000000200)=0x4) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ftruncate(r4, 0x25f) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) socket$bt_rfcomm(0x1f, 0x3, 0x3) 23:55:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22040ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:39 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f00000000c0)={0xdd9e, 0x8, 0xe9, 0x2e, &(0x7f0000000000)=""/46, 0xd2, &(0x7f00000001c0)=""/210, 0x1000, &(0x7f00000002c0)=""/4096}) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:39 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e220a0ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:39 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:39 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r5, 0x80287010, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x40000000000020) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f0000000000)) r6 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000100)=""/149, 0x207a0cb3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x1, @local, 0x4000}], 0x2c) 23:55:39 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:39 executing program 3: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) dup2(r0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000001500)='/dev/vcsa#\x00', 0x1, 0x141001) write$UHID_INPUT(r1, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) 23:55:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e220e0ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:40 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:40 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1254ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:40 executing program 1: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000001500)='/dev/vcsa#\x00', 0x1, 0x141001) write$UHID_INPUT(r1, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) 23:55:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e220f0ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:40 executing program 3: syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000001500)='/dev/vcsa#\x00', 0x1, 0x141001) write$UHID_INPUT(r1, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) 23:55:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22600ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:40 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, r1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fanotify_mark(0xffffffffffffffff, 0x10, 0x4800000a, r5, &(0x7f0000000000)='./file0\x00') 23:55:40 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200), 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:40 executing program 3: syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) dup2(r0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000001500)='/dev/vcsa#\x00', 0x1, 0x141001) write$UHID_INPUT(r1, &(0x7f00000015c0)={0x8, "539dc5034b105778733af5042f1b35c5aa7d8c886bf5de88d5ecee344df67b6ed79e0b3e882d38d6c625b9483ca8214dc98ad8aff2d86e330cf75263d193277938f33e036e59d5c79242e0abe9ab54e92558fc224dd9ff27aa44303b3330ba657091b42f8f79174e4e3916950d3ee3b25a7acd3b7ae44419e1d4273a9dc3ee5a84faea57aea71c3d44057e1ea5f8749735b4b2839b2fcd3bd73d65f970953cd90fa1fa84761c10754d71f9c45ad92e3e0ac7c88e85b163feddb6c7a25c627c5f45acb4ad7bbbe6985e73a3b3d544593b849c3f5317bb2b9bcfb162a4fbdf41b2f04add17ca8a43224af44f79020560c5510aa9a1f8fda5df9d8a995a81014048d177fe83569e15d4b19ebf8477add2d093b76847034356010274b19a5c9105c26b061640778bdb325ef4b2e1b625c582f47129d72261ba62bc853587e3c8a1c39e3f7dd55e3db1aa5b529d0fd3196953be90711a3c44c79a8828cd6be308676dbfe1b4376909da21cca5acd19b2b5efc847933a5687b405acb4c7e6126d31c4d57c3f6d4ec470ea51aa5a510335a1ab832ad5fb518261fd71a4ae801a9131d6572d656492a3d52b400c0c7b07bd3cc8bd2b7f633dd84db12ed326eef776130ed848a76a52a7e0bb5dd3ce269d00493842d0fa82fc3bec611dba727a0d0b3f3e07c3aebc3d0c1fe34ee984cf17e8918d899c2c91d512b12c488f39f74d58d589e0dbd1a023243f069929e714924f832b5ea6da6888cd03bbb40aa394a8b5850d346a4b93368674f03e169b1980ce3fb656ee874f05e219207cb039f12c8cb4ec3b04f145ade873a40790b3a9ccc91d407e28eae13302e72108971a3abd4d20abdf18394bc2b93bc3bd47d2cfd8619ce11eb4b6a1f2d4792b00ebad9f9c81699369b8fb7bbd3a05207808494bb0a4821e5d72f73e8ac5a7b1a9c6d0977a45ad353ab70b1cd0eededb119fbf6d2acfefc42be6ef9a4232964fdf930fcfbe135383d1d87e785adf5d22a4b04c77b2e5a138b6751c6f1896e97ec8a04767f2dbf5e177e176757d6e0fb0b175ac5cd98454a28942fbd87f29efcd6725492bd86bb63287a93473f3961a1603581b8f94d03cb6265d64ca0b49641cd1f5941ceaca15777619e1a224372689a2ee35e0e8ee494d56f85f8d1ef94031fb4440eac784d95ebb04cff3e7aa143dcfb1b7ca11729909fce59f00c578367d8cb1266bb9e0dd9a67fe01204b2450324ae48f51a59a7a39e755acb97008195beaf8518898f8cdb3918018ce1ab087af0a4c09c8f1f8d998da7c466d91d8e020e8db50c7783ab0bc0245505d2265e05d66d3a7cdd900eae91e31c8aed12d68775dae766d9db146bbb2472a662aefe4a31a2a50297263f32bdb6512c4f01ee4f9e76ca66ed4f4aa76a4f5e26b3389814b2922f15aad9487791c5ddcc807df6b71656005b6fe0b6aabdffeb78e7c44552fd973a050e91534636df70c725c315748e92a4712f5a7ef150eddc7c761ebf4c1e0902c312d23f25848709cedee10a83444256842fc182c510105b49c992edc8f1b701368d3690262eae7969516a8c66cbd09b8f522f70c79d5de95c235047ecfa773d5c8ab4d0c2c41326689ed5ee0143cee7928173aa7ae9432e8d33ff50847728601e246c8af24a228df1ea023d0f45f444d3645a6d5149ddbb1e456158ce7b1ac751d80958b2ed4ed3683500986e8e4810e651af9bcca01577d9b681ce115cf306e5edf2a92557078e92d3a940ae58eb7b9fcaaec076cd4d6d0d00ef53f5cf220b85703670307f9ac247d20eb4b3b01f9ca6ba05ad9b230176abdb6d6ba8d1114cd2076ddcf9682bf88f9c1129424b2d9335e644ca9064bdc6f6741a9640bf93591f9f896e0958a1b4cd06e5b6acd6238082f0d13157a49cef61a4bedd159b9e08231d740cab593fcee23b688fc33b464abfbc489ab9a1c2f5b8a3b30bec9c4d8895dc56fad32d74aa8910b991150c54b90b082c0c4823632d48ac103e882f272df521660780e96f3bff7cc8026f39bb360d96720276a29622cc6b8c461a0b6070e6ea8dea0d20a3cdc876c9c8309a8e8083f0e5e2fe32ce61d81b7b03bc1dd73e2b3ff8533941fae00fd937168dc0e10b90747acee23e5894703edc24315319870bbe58484e1e92b4472a8ef26282852e83081b413055d49f946d31138a20eb9c7937c9b33e7e408c64bdb1f5e182b87825ad1bd9981ddbd25a3d9a5b5ae5f12f2b5c26768746b5ea15f7626a34b68af9476fe931d958b6c867069ef9683f06392a5b3849c21d82686fdf9b75f36b9bf97703d31fc9ab45b8b6a681ba8d5b754b5851108fd09811891a7cb9279a7e40beb7f05a474ac10af021a8d006b01e0f17cbdd485191d02d310b2ab79482cb86ab5cb7a42b189044b805926a91f4273bf2c343279831241bff7336f8f312eaa6f0c2155b55886b09fff118bdb5c2a7d7ea0b38c0a7a7115837ffad097c478b046abf9eea723c7c7087140e29bb8db5210030fcff6c1804cb4a7e727bec692597edec662ca9912bd9b1f9a8825d6e7c4ad6078c60ce2f7f283dd59506a0a2d331d1ed29d3955454f61942e58cc251d4889d6518574130a0ab6da6047e49b4466091fad91c9c44d4b4c2ea054b583957c20f6a7de019b0731bfe9b76ba51aa88dbadf42f09d46cc4942d44dd4a434705b86e01e5e0cc87f5a3d455c7d0c406baeeab319c1ba0f38e5f08fe3512f9e72dd8605d415e649fec75d8f6065e7ddcd39f91089d0f9ff62dbf8fd6ca07cc2f21d3a9c8d1c34f85585e27f46d222dcc3a71faaf0cdde03af31ad4a32742e58f60733bcc18102e82fc159310abaad3c21661e2f2374409cb0a3fa1e410ec92ac6eb8fa8b26a66a5cabb87004dc1199f449ec2e97a3fe750eae2697b50bb996f8ca967ed87a5139ca34f9a227c271b3f7fcfdcec7ec6f5f00fee000585099c2bd7a115c11e57c0cd64e3406f37afc1a8333e01812dfe6398089341bab8328af9ccece6c4f52216abad788fbed79f8addbbe85451885bf116e8513b06bcc894572952454e5bde34753ac50f8ebf5d22cc5ff7ddd1c1dbf79ea62c7fe11f0222ba9f8ea19075713a3e7a97874ff609f46af712720cf477237bc56b4ddde9400c7bce30dc9ed41e6d1bd78962f6e713ffb38cb1b4bad9cf08dfaca1114ce7628af884286c94bbf9bae794b7d35515c4edc64d01f2a2b275f5bef8ded363be0b15af2d22e2cc03a89d5d9f83b4bcb9ba46f5d321a15b22f51bffba163bd036e6d05c02f3bb072be3c309a2aae9aceadfecb809ebb589433cfdaa5d334eabae578335bcee60806879416705935e0ae62cce04dc1e4d1fafb57b88947d649141d358ad0a4331015124bfe3e4bd3b38e276f92d534bbbad37cfcb396948882a46fd6662a25958dd27954ee9097c2e945726c2c18a367117eb852379c4ac693de78b724004e9de2f5735ff01996d06e038f39d7710a89e4f323f457789c6c637a4bb9d99e7281919eb06123abd855505399e6aa4f989001f9f615529651a6da0db9b48600f0391c308d6978829e9e66dc9e3a2f6a77edb76567608f3cd8547b6a6355360a3c307d6b8a8bff486565e33d9a5e8e2e916336c9cfda7f0299881215d368d49031dbe3e6757fd7175ac8582b259c3a40312aebbc509f7623b5fe51c110928e2cf4da8771a46152d7ba67449665b83b4abcb0d83f4a916020b0fa1af09af4784e06bc70f7a166b46442b7da2526b62ad3bdd3cbb314875aad65e389be47bd675d6bb2933424b6c6e88f36af441523cd6328f45d7941d855ec71971b39de3429a729ff78f7fac52986d150ba0dda923b57e167b0c2dbaddf794db27cf12c3fd6a53f77d937158eaf2f009759dc72f9949824b799175dc1cfa8be88c11cddde584073ec76bedc3e68ffe74a91cfe0e579867ece553af00753db4a9db056fec9e4275490f50f780a4838b54d54dc09aa05a8325d00c4dec24856fd4244783d611a713b5b5077afa197f799c9f68355cea1a0ab7c897fd6037aa2296e96ce53d5257cc6fa76aa58ff18c2a0ea4fae10ecf75e4b1e06aed10050dfc4f1a22547bfaa0d78e97113c9206a595cfbc6b6940952ab691b6ea049606155c7ffba49932c765a0f6d468af04422845b00b136bd133e0618c447c703ff5b9a1c7af194bc487e9c4931fae40e5849ae2251457d06bf82eb8bfbfa744fb24f705c1a65d7436463e08bf27cc20edaeb2b4d0040a360be150a61f94a5533c82544b7833cc9b3d924b92eb189136c4b52666aa7ce33880af6fca8856b2e1114dab2c57a290a8704e6c82460c4c999e020e9abb8a0408fd63beeb139831904d082e4a419c79f95e3487729c3fbb025016d20ab4d96dd5ee8b0b2023c54468d0237e99d73d6b037dccf92d9c8ac17e94f8519408f4a340882409c6a7e60dd0be73cf1161b55b30347f7338ec88a913ad048b545a82e3d84d6ed3b70afb240ed482303e16e11991f699983864c02e41f2078bb1d1f2ae0e5cd6ca884fb2a96296668d783adc2c2c94b3f32e1a035eb2856d616016111564df7933b4c227045756e79f9a83c41df717f0e89a7fbf29cda0317912837408b8e6e3820b356a6914a6887510ed6bf8861c81c80bdf42e6f0bfab0b47b67c751ec813c4cad8b2bcbebc138c3fe85e1ad67b2b120fb207c65f43a9aab037f88049dc25cc82fd523a076795a6e9b28a9cd80667b7a658a7098a8b300837cfef63a98297b6c2fc2db5971f5a92ca96c6974bbb729239f78fa3184f5011e342f43b796b1634d612f029c1e3c2acfb6f1e649feecaa952d608ed9e8531ff13e6af75e5e09ef29918f8c6953822746f889206c9e9e472896c12762e1843fbccdd7f26668c00945ff0fcbd9e79ac3a12ab3ee7eb60b4a33a3fba58295422808c2d35cd2aec0aa8b51e84f06eb79369b08a4875816f7040c24bd353a66e0c7d6f56ff3d6e9c42a77a5169b3cfc3c58de91e280d3b705c8488df9e096d66cede352c00d7d9c9fce344404bb326e6695cd2f6cfc839a6b1d857da8703924356f5a154303e76cea9d3d1bf695cc1843abf7c66857cc6800a2e8baac97317a62a4a76edccb0a8c9570dc74b0dfa461cdf8b706b8c8a914bce3a91eb9d547a5c35c14d477a0f27fb2b3d1a90aa70c455ea8c6995d39cabb7d7987ae25f89c7d3e26d6885732761f39db5bceb17992aa6b37c40b060a8d42a78118ec8d3fb26ac1a3d3938f677f554e514a65eb07b464196edd30a3882a423753e30dac26b5286cb3033175e8f600f6a7b5b203d9b06ad1333e2417875f1aa5f43953dc7989d7342e7b4336e20b2f033375bbd6fe228289e4a8440608123f8247b1c3a7fabb5d75f875febcc366a124ad4d43b8900afc3e4471911482d7c9dcd2afd579f0e488447d972e41c3497b2da66aa8eeeee6a89d2f1897572375677a7345380e9270d02fd4d32e06f3e53aa120563e603de19a02b3b37e2e652cd2a8152ed1a31feb9e1182731fce09b52a500991354985c108de875a9ab52508a430d3aff226709b46e00aac462161d68d1845a95cd1c56e16d7acc2fe3224b2dc9bb441e53e492146aaefb4c30141a2b6bd14b0dbc8e6b1a713ed4c40fd0323377e72f1c25f1c8ca96637a20c735a1edca585b412104945f1523c6af518bfe7e3ab8bd51540ddc10489c372a91c76e56909ce86c8e045cd0bfe7a270564a380aa762cca36e239e0a7c246b180376d71d349c847c08f80e15520172329ec3a7971ec585148e93a264c24470645ede73198736723972480db5dbfdf853c", 0x1000}, 0x1006) 23:55:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22df0ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0xfe, "ac41d1c45d71d3ed2a0b2209895f348f8fc6716e08d1364ad5526c6e898cbb6a3217fa0cb9e4cafe05691b020000e7188b6c95506674f13ffa0000006e00"}, 0x60) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r2, 0x118, 0x4, &(0x7f0000000100)=""/149, 0xfffffffffffffe18) 23:55:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0228925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:41 executing program 1: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000001500)='/dev/vcsa#\x00', 0x1, 0x141001) write$UHID_INPUT(r1, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) 23:55:41 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200), 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0428925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b", 0x400000000000}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCDISCONN(r4, 0x7439) getsockopt$nfc_llcp(r2, 0x118, 0x0, &(0x7f0000000100)=""/149, 0xffffffffffffff76) ioctl$VFIO_SET_IOMMU(r2, 0x3b66, 0x6) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) getsockopt$netrom_NETROM_T2(r5, 0x103, 0x2, &(0x7f00000000c0)=0x5, &(0x7f00000001c0)=0x4) 23:55:41 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200), 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0a28925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:41 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 571.044953] device bridge_slave_1 left promiscuous mode [ 571.050467] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.123727] net_ratelimit: 18 callbacks suppressed [ 571.123747] protocol 88fb is buggy, dev hsr_slave_0 [ 571.133989] protocol 88fb is buggy, dev hsr_slave_1 [ 571.139829] device bridge_slave_0 left promiscuous mode [ 571.146190] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.409696] device hsr_slave_1 left promiscuous mode [ 571.459987] device hsr_slave_0 left promiscuous mode [ 571.519947] team0 (unregistering): Port device team_slave_1 removed [ 571.559413] team0 (unregistering): Port device team_slave_0 removed [ 571.596621] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 571.652531] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 571.683761] protocol 88fb is buggy, dev hsr_slave_0 [ 571.688910] protocol 88fb is buggy, dev hsr_slave_1 [ 571.796502] bond0 (unregistering): Released all slaves [ 572.899439] IPVS: ftp: loaded support on port[0] = 21 [ 572.987416] chnl_net:caif_netlink_parms(): no params data found [ 573.021511] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.028033] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.035349] device bridge_slave_0 entered promiscuous mode [ 573.042175] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.048659] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.055633] device bridge_slave_1 entered promiscuous mode [ 573.074075] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 573.082943] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 573.100888] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 573.108589] team0: Port device team_slave_0 added [ 573.114266] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 573.121477] team0: Port device team_slave_1 added [ 573.126830] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 573.134252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 573.215827] device hsr_slave_0 entered promiscuous mode [ 573.273923] device hsr_slave_1 entered promiscuous mode [ 573.334338] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 573.341320] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 573.356204] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.362584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.369270] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.375742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.412284] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 573.418782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 573.427789] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 573.438499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 573.447175] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.454414] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.461353] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 573.471281] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 573.478700] 8021q: adding VLAN 0 to HW filter on device team0 [ 573.488296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 573.497083] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.503446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.524486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 573.532234] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.538931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.546361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 573.554728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 573.562829] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 573.572917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 573.584410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 573.594426] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 573.600514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 573.622590] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 573.630216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 573.641454] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 573.658411] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 573.763767] protocol 88fb is buggy, dev hsr_slave_0 [ 573.768914] protocol 88fb is buggy, dev hsr_slave_1 [ 573.824286] protocol 88fb is buggy, dev hsr_slave_0 [ 573.829704] protocol 88fb is buggy, dev hsr_slave_1 23:55:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0e28925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:44 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet(0xa, 0x80805, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x22}}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0xf, &(0x7f00000000c0)={r6, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000000)={r6, 0x9}, &(0x7f00000000c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:44 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0f28925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 574.002372] selinux_nlmsg_perm: 134 callbacks suppressed [ 574.002387] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23302 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 [ 574.053725] protocol 88fb is buggy, dev hsr_slave_0 [ 574.058895] protocol 88fb is buggy, dev hsr_slave_1 23:55:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000000)={0x8, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$nfc_llcp(r2, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff6028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 574.264013] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 [ 574.318316] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 [ 574.360204] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 23:55:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfffdf28925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x20}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r5, 0x28, &(0x7f0000000240)}, 0x10) r6 = dup3(r4, r5, 0x80000) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r8, 0x7706, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r6, 0xffffffffffffffff, 0x11, 0x1}, 0x10) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000000)='lo\x00', 0x3) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 574.411386] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 23:55:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0), 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) sendmsg$sock(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000040)='\\', 0x1}], 0x1}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind(r5, &(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f00000001c0)=0x400) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYRES64], 0xd011) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x142) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 574.473287] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 [ 574.504243] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 [ 574.579451] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 [ 574.593194] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 [ 574.680812] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11816 comm=syz-executor.4 23:55:45 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:45 executing program 1: getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x8005}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0xffff, 0x1, 0x1, "7946223f4fe4346442759aa418f28af46b40144ce9164d4b2c53dbd269a8afd5", 0x606d37f966e8d384}) r0 = socket$nl_generic(0x10, 0x3, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x5}], 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002040), 0xfc89) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000040)) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000020dc000000100000000400000000f0ff000000001e"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$revoke(0x3, r1) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$revoke(0x3, r2) keyctl$unlink(0x16, r2, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x0}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x0}, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xf, 0x0, 0x0) 23:55:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925a000320007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = fcntl$getown(r3, 0x9) ptrace$getregs(0xe, r4, 0x6, &(0x7f00000001c0)=""/250) 23:55:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa8001f007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 574.898062] audit: type=1400 audit(1573602945.439:80): avc: denied { ioctl } for pid=11841 comm="syz-executor.1" path="socket:[50153]" dev="sockfs" ino=50153 ioctlcmd=0x551e scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:55:45 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0), 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) sendmsg$sock(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000040)='\\', 0x1}], 0x1}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind(r5, &(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f00000001c0)=0x400) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYRES64], 0xd011) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x142) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80220007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80420007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80a20007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000340)=ANY=[], 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 23:55:45 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 575.627089] device bridge_slave_1 left promiscuous mode [ 575.634023] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.689486] device bridge_slave_0 left promiscuous mode [ 575.707173] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.879757] device hsr_slave_1 left promiscuous mode [ 575.928506] device hsr_slave_0 left promiscuous mode [ 576.007929] team0 (unregistering): Port device team_slave_1 removed [ 576.019858] team0 (unregistering): Port device team_slave_0 removed [ 576.031016] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 576.079946] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 576.170672] bond0 (unregistering): Released all slaves [ 577.002120] IPVS: ftp: loaded support on port[0] = 21 [ 577.135502] chnl_net:caif_netlink_parms(): no params data found [ 577.176928] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.183360] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.190704] device bridge_slave_0 entered promiscuous mode [ 577.198165] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.204868] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.212169] device bridge_slave_1 entered promiscuous mode [ 577.231636] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 577.241268] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 577.265642] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 577.273143] team0: Port device team_slave_0 added [ 577.283046] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 577.290550] team0: Port device team_slave_1 added [ 577.296116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 577.303456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 577.356538] device hsr_slave_0 entered promiscuous mode [ 577.394158] device hsr_slave_1 entered promiscuous mode [ 577.434504] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 577.441641] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 577.468536] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 577.514574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 577.524242] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 577.534884] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 577.541151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 577.549085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 577.559463] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 577.565934] 8021q: adding VLAN 0 to HW filter on device team0 [ 577.576674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 577.584306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 577.592498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 577.600761] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.607247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.615245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 577.625212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 577.632280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 577.640969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 577.648728] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.655153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 577.664858] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 577.674315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 577.681374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 577.689711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 577.700098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 577.708120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 577.716248] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 577.724811] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 577.735511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 577.742713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 577.751551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 577.778186] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 577.786116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 577.795087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 577.805188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 577.813392] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 577.830011] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 577.840363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 577.852250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 577.860433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 577.877593] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 577.885697] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 577.891926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 577.898729] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 577.910562] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 578.063733] net_ratelimit: 8 callbacks suppressed [ 578.063742] protocol 88fb is buggy, dev hsr_slave_0 [ 578.073753] protocol 88fb is buggy, dev hsr_slave_1 23:55:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:48 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) r3 = socket$inet(0xa, 0x80805, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0xf, &(0x7f00000000c0)={r6, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r6, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000001c0)={r7, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x200, 0x8, 0x9, 0x6741, 0x2}, &(0x7f0000000280)=0x98) 23:55:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80e20007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:48 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000180)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000001000050700000000000041cbcad90000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xaaaaaaaaaaaab27, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 23:55:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r0) keyctl$update(0x2, r0, &(0x7f0000000040)="7d2e56e5c5bc99f73c0ae1740eeb40bab6cea269760b6e8a8618e09ea5547a9cb337a6c73e2f8ce596552dd97dfd5390d2a3f7ee17553b699fa55d9e2d5fbaaab22d8f6a1afcff5c23db2b00607f18691450b017010a2ffc978679d6ca7276eeedbebf9952ece52979975ccf448941dd51f3320162883a0f1aed3f09f5d79f8841f9fae36d8d0da1f9ed3a7ae56d5da4c8884e639bd66851b51c95dc090de304bd61f81e846bc66cc34bfe72d10355446773c1423b25c10e026abac2a2cf65a8e36408487a1b7b00ccfbaf2dac4dc0e71307f62dc8fd1fd1b3a369b89a00cafbfcd5d82dc4f89d1c1b54c1d3771574f7085d06bae0944529e6799f787c66fa5f977058c70917685411ed319b791905c9f3bc1b1554f92dcdacea5aedab0aafcfc0eabcf30f4feea0fef7db19248a44baf039ae8733e0aa8db1fdec0880f8a59113e7a8e84144f028293494f12e26e793c83f2681ac1a62f57d2c438a51f9bf9de52d37140dbdc4a927a9446c8f8db1490b63dd1733c39aa2b952d5ca8a94c9f3f916925b2cbdb2131eccd9ed4f1fe41f3f362fe7d7a107d667dbb4bf18af92fdf147168feabfdc608775d08d2d6f28cab05ebc53e5bab50cf33dc7e7e8b1acf3265ed74de5a4d253daa39e8a1446aeda721c176de820f09d1f98cae9c500ef2329df1f45d11deb71971b455d8220be0c2a5c8666a59b56ab901d2a1ee6bdf91e6aa8a8ace7d9907ce57b51ba9665c51902bd942ae133ac7047bfd804e1eb5239a682ba6fd082871656c99ddfb39ec2f0bdb348f79bca49d45d01129ee5d3853c210ed79cbc1dfcff18b1523631662ecfc1a3428571fc9025bbfdf448f38cdb64c21f24ec3e45129e005fa0527591b4756c8796ad207c474ac20748e9c00a296580b12b1c46c0a931f7e62c53c8dd249c97f004aab1672751b87b6b064c0aca974ccea149e4d7fe2ab292dc153f3019a74ea15e189a1abc73e6014b9b00a35e158870f70f40cbe32ea4500d0b712a8ffde6585f39d51fb4ec401aac9461b4cff0d36c0085faf6c1ea8b5a13b05623a5b8ab7743bb1b396fa08d2df74e6b66257c6e237b0ad26c0719f78e8ffb223b0161912bebe4d2a9e793e6a03ef48afb0ea97e0b050e455c34796cf7ec8551a1d365419caf826cef543abac08237e07d9abec596e10df039e765281ed489b459cb8d9927c8b8310247e279b829ce9d2bc6c540196a4c9dd950a112ec986e61f955cf21dd3479e56c13be895a4c4c5c25617460297ba5fc0e1c46429d216c7405c51a9e2e395ffcf14d5a2ee4efac4b6d6f388440d946efa19050864d6c9a2c349e93d773504d6446cc7b56f51c2d0efecefed485b56cd55ec4e31d2b6ddb28b1ed697966882ad2db6d9d80791b979f3b1e891379b38cf78833d2b91a07fcb446d30f260253d82601cd29c640192c60e92196ffc2072e7bf899f7155ebb25bd9330d5da2a7761c48778fa57be7678adce2f28c06979d088a4fdc236852b533b39d580c69678ee2f36fa541236e0b18640c4fc4561e180a05760ec55ff1e04579f89c51b4bfc86a846e57782533dbb47ae78353642d4b092c27e2d5eca72bf346245c982d4444c7f4a499861ebf0795ab432fb51db4c04fc6c826a88263affea1f151f28a821167046e27947543c0640f941e72976cbf67df8f1650b801b2013793d30dcc6c54a427fc64b4e7b956026089860b2fc608f9376e5ccdaf74792bfc2743b866b33d5e81ca986ea65152ee652166d1ba582ceea7b0c6584adcde375c4d7b57a182464f31edaec4e242054067ede20dec84c37af252b7fbca255585c79906f375edaa248376b80f861f9bbc91ca8b946d239b72ca8b61c4a64cae8a33dcb15801fa24ff03d913edce2198d070b29a9edc61b73e5f12085ae25e737d42bf97074881cfdb90ff7ee1a4d4e896b7c1bf8e89656cef2af5fdc06124f5ff6490f0a612126a759795565ce9cbffcbb430cc4d588e38aa9b4c3b5904d70411b2d1a7497005eb9f450a73d2a0a5e1a7d85dedbb509b6115057ac0b981cdef05f0b87db0ff12efdf8c5db6a1d354fb84cd93e7d4a461262239321d937e6eaf7597bd8ba3ee67645fba6356e272744a4b82137d46401102fe30463ec230cd28934ac6cb59c54047fc037d53b4973591851e4fc5bf5535e1306836f6039babe4d88a512b6942f15b07e7ba08275d8d063572a7765f4edcaaf010c1a89ac663d216db685221fcefc0c929a46379665fc6923c1c6de8f34ac9ad7230f4a58e3dfcdd3da1a50ab409e4275b21ae6c5c7514720f6c2f9327bb698f553070d4cd5720b1d9b52f6235ff71b566aaab79b7c8bfc2d2571cf73daf2ae4c563c8beaf9effb3691c4d25a4d7612c0a408d5ec71fff682e02a5fd57981ff10553cfd3c490fb5b9074afa26b1905e5735cf2e5ed5d7259fd840be1de4a1c0bf76f2393590f5841b92a3c1518e9392ac6d2b82c4286044ab8c7729968beb72b27e11bd9561272ec4ce405f7d85188076c67eab415f1212827593952b684a8277b29de1bb64946c928f15d822ba9da093cccfbddbcf1be5562106c4b2f4bea92663487b7abd6b9026cb66fed027c3b3cbaa9305efc19524738324a1c7a29de7889f00cbe46349712dfa7640f7b399a0b9b1105e6e7938e54cb2fbf818f7784e68a032d6891a1faec0b165fa570c1dffcf61d3ff6f45903b27c65498c85c1724c40c87f51c65642e39f83bf1ef152ae2ecdd95186e0486f7065f3ab19976c15b04e129b6fbd4a8d4217c509ee7f2763a0f0843564a8ad37a32d5ff33917d80820eb711d541ad34ce6eafe2a1df438bfb3a14dbc0d6f58db0c82756784935193c467023bbd034697b72c5000f2af444dfc259bb3cc8f37ba4b3a3a9f569339668d823d216c71f50721d0a50a28759654347521dbb160b1de146d10c5f1f351dc133b5a507a4c5c674602edc44ab283ab9505bd16fa3be6223b15ea0caffe057a6b82f97b611c14ac9d0e038c0f5cc215d1f5eda493e3d7c9a562a566c9355c69f23281249182dc6c08b5e688f272ea8f6c90823a7af597e76d9381659e722bb1e0ceaea7f66ad67fdf1ade87466c569aabf0a431e5b18ce87ef00d7ca269caf0106fc28edfb4dd25ad120afe6f238b9360e1fc8ef7d4d1bc9cae47582199e8b6b8d1616902cbc96f01684cc22928898d6edb96eac52cdaa61f4df7f557cd2f2d75276a0c6bac6f0c3418cf9b1c6c048dae04e45102ccf2aec5c9c25d688acf35535ff56f885d7a835acfe9dd0a7f992ed9da75231ec9f44ef4a5ec86e86291a24b93a8c524c0b903873e9935eeeb3c7ca2f5f386a2f040a7201d85872d0969bec37611966d0caed27f2f1be1e501761ce6d36dad81624d4cd3f63766429404e9910bd3f96aed3a90f2a6b02782731f65a6bf3e6ee1933121de291221a84e6d7cf5912849d651be9a5423f36e781aad587c99ff0da41fbd1db81154eb01604adf24abfd52882a58afc826641ce7ebf3c69b3165a966634331e0ccc19c8de6b8621d740f6520a9dfbdc7b2fdecd8f379e5bcd611585d6bdf8beb66a1c957faaad5ce375ae8a12b6fbe45a30d16e6ba6b5deb5e78e0ecb40bdf6237c3d9227871c4cbb0a0541e4d5a34c68ac3a0dc8fee7035d7956a1835952da0bab312e4d287ba0a5af7d93df206eb29e2c00a8b11224543995fb6248dabb585fca61dc9407ef0e3a521b089e99807c3801e7836614765d46f39de1594c6fa1ca9be72752e77f3af13f4da2f76796f2d79006fdbd8e8396ec2d7955a2cbb4f0e036cb22ae44f22a0f11fa8ab4e0a8734bbed5ce43bea0282a2b81275cc83f9b03e30a36c8d8518db66056019c8bc5a2bbbad6447d3861cd5025081465fe3fe126d9d2d424445e6091c66072c42df4be7d745c41f686625029fae8a5ac8814d5159289c6ef4a56aa45b8e17c333dbbea6c9fdf835be9556c6727930aa3e13eebe432fbf70a1ba8bbdaddd58a5c9d9b8e17d36230cae1bd2a6b84f9828eff9e6e30de2f54ab546a74197309825e1a4a685fd7cec4b7e5fe695a135ccf61898262921d817c7aa3ea77cad95cb528399dfde4597c279ddce1d05d806347d8c986dd195dd86f2f5a6aab5d9deb23b902821b9f686b8f20e4d51ce2437139423c56e150a0fe8c26d8b33dd07880c561320428d97495b9d5750f218a477b2a8fbe52a94ba330a564deaad789439252f249ef318cc1015a4d2aa7bfc491396d2670590406321eff84ccd1718b90bbb7e80f0e694c2952f9051b9fca5377b479a6d64ad74fa08fe027ce55bc62ae984ec1952e57144c790a71c4d2204a3592227705183c00bb50f68709db9f2b3d4f15af2eddc152260179b747845bd234743cbe8fbca75b309b419b5102946a61d603208adc1a9d0fabbe8c4aaf38d62ff9df3f56d800d37c6c4e6f6542e2de099e6e865c6edd92648cec232f829f5e59e827f6e52fc17922eca4afb9289ddb62c1471d7c15ee89536aa16e165ec725b33e6e7c0bdd8dc7d197b8b79c857acc5fd7505ab0eff50d5148b09e4b2cedd2cbdac89f1c8a63f33a5029c0c5844a74a5501ac3103b8bab332797badb3cf1ca2625eb9f61ebbacc74e95341cc6498ff113430d4bd6231940c2fdc8e0762bd9f04e65e829dffefa0174b003ef846afdc4e0268594f499695256ed39ec7f680e7e4d5f4160130323a1f8241e3c2528980a1372eae3ca7d4f7d7ffcd2ee9d62bc43452b514ef0f049b25fa25be16a7152133a73869b34e3a1cb87292c7fda12c8f5307828c345ff1ac27d69a09e2f5f4f0b7ab2c1dfa4145a0b3ffc837c4d1a90a7113424fc548530f8d5b9707cbeb5d7d33e344c591734794dc52b7856ce49321d5e55047bcea46cdb9a816f5d98b773b2e359c88c6743c6595954e9db605df8d282f38d9dc1281138fcdc25389c2f7c72f8002013d1a6fbd6f62ee05a196e1cbd7ed28e349ed54e983a356f224879a8eb649deed217d8a233803093816e947dc704b766d2a9eb3d1939956b5424432351fc9479086c5d86336d021764d19d0f758789127acf9953ac6cbd3b2499f80c47937c73e0532bdf43c79cf6c8a82161bba0e5e9f0741ad0616d78499ff5b61bc80eb3ac522595c2ded1f00415de0fa8dd6ac4e0eb48a9edaac9899611db904da27a1c818ba8c743d2631475fdb023f2a82da233135374200f0a987d11263fde65987c3702c879b79100613de8c26be91f26fa2d48139cf78301ded0887014ff5f8d905da23d6885678783460a41161a6350e75f361c748b8d1e404b4e098e4e82c96b69548b9a5e5a07cf0f2d6282150af5677e731fe9391a91411a72e3f71438c1e0aa5f93877a85325126d50ecac4dcc24c6eacbaf445cbaf0bba5bd90b5a7b4c0a6265c20ab04194338a2e12f17fe0fe769631beab913b46091e6fa988d7547723ca16337a4c8615e85afef3a6aa6e965d62929c0ff32dd90bb9bd02281284feae21b0139d6ba36f3658bfcbcfa65a2df6ed7c412fa7379ee5df9870cbd488f3e069d584a20c349803761579da0e8b01cb7c949edc793bf68150ab16583e162b1885fd90a2e1900bed771a73e2831390f9bb2803122c07436c42986a148f1392ad95522bc5687eac3e4eaaab490a2fc7b653a391582af2c1381165699021952622b6f34a668fbb8991bc88689a255fc6ee67bde9bc933413884bbdd33a65534f41c095b799370e360997e8cc1604628dd66c68f3f0630506a1aebf9c828db8368ad8c5e0714daf1098e71aa9c1eded6ec9a8339de343bd2dc97", 0x1000) r1 = socket(0x400020000000010, 0x3, 0x0) r2 = gettid() tkill(r2, 0x1000000000013) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000002580)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000025c0)=0x0) sendmsg$netlink(r1, &(0x7f0000003940)={&(0x7f0000001040)=@kern={0x10, 0x0, 0x0, 0x40004000}, 0xc, &(0x7f00000038c0)=[{&(0x7f0000001080)={0x22c, 0x20, 0x20, 0x70bd28, 0x4, "", [@nested={0x98, 0x0, [@typed={0x8, 0x7c, @pid=r2}, @generic="5bd3937ecb0f964fe4c020c023b73b0d5ae163f65cd3428d9fd333f14584e0f0f27c00b35a0f1e1e8fbe5fc7334bb26011581d60bdc6f903a472f59fc04ddf53cc27bc50a4179c6fa94a7fd0a125ad5410694b830f5785e099b278913600f188fb760ef311b21665b583514acd373a227840630552f0f4ea405b5dba4bc495376b4758dde1", @typed={0x4, 0x40}]}, @generic="88a111698dc663274e77107633b48138cf5f4f478909ad86e026013575c22384bf6a49137c24ceff0743a6bfc68f33a01d6c94e2f5826e46d64e03fd84769e1dcc040a9ea6f3fbc08a34a846f8c720b7a4e97492bf9da046a046966f8a3d574dbe322336e3b35fbeb8c863a6852ce278555d", @typed={0x14, 0x1c, @ipv6=@loopback}, @typed={0x18, 0x8b, @binary="1df06e7b653215c1112cadffc047da052e5f2f7b"}, @typed={0xb4, 0x1e, @binary="87b201a672da5e236484e77ae18c8b9bb94542cc83f9e4adcc0a2e9b90af06b61f5e0a975c8ea464809ab6f1ee974d3ba3ce5a096f0fff9d2bd2b59cebd6fdcdc7916e363c294e140847c0a56b7d0753c7b86baeb943641f6128f86f2a98ff18b85cd7ae309932fbc2a49c5e586a335967dd3a8d90cdda482bb40cd87e80a16db19f67781f9761cf316fe44deb84f0ccf66494e75933b8ccfffc123da4135ed7b4cd122b2482c252410872779c81bb40"}, @generic="3be2806b758013159e4fc754e6ec087ddec9ed5a", @typed={0x8, 0x61, @ipv4=@multicast2}, @typed={0xc, 0x44, @str='keyring\x00'}, @typed={0x8, 0x8a, @ipv4=@loopback}]}, 0x22c}, {&(0x7f00000012c0)={0x10, 0x35, 0x8, 0x70bd2b, 0x25dfdbfe, "", [@generic]}, 0x10}, {&(0x7f0000001300)={0x1010, 0x1c, 0x400, 0x70bd28, 0x25dfdbfd, "", [@generic="125cb0702a6d5b6b6578c0850038c32755c5228993bf84bf4c8570c259ac49f0445a4a9d30187af27f8f59890cda024b6518601dc7a0a70b38d576940936fd97a1b9a968a13d66b1e8177b1c415247843611d0fb695a586636049ec1ebfb4119c25bcfca6ea5ebc2dfb8839cb4bf255a24a8483f3b918c9bff2fb2119a6267e871bf9f1736c513157db6960b6464ab9539dbc4cf3351f2d8c8bc1b50cbc4c89c1e4cd6a87be8217d3f014eacc4d7d18aa8f3b46fa0839ed193291287d8e2af988605a706afac8a44fd099d12b034444770bc23f35ac5fe8cd6725905093f53151bebd76d5f698831d8e31ac0f1a77065cfff18c83b69ebf02fe805ac3db6ea651dfaaafc3d30861602b68aeb3efa6843e0963ac58d1bdbd7d0988d82962ce5c2e89d9f27b7f2efffbbb1224f2bb32e030dbc54fa24e21a21655aed7ced90c17c2cf1a3fbd70de3748e31ba24611364992851c06088ff48fd0e76bbe09ddb083873ce5e0c9f38b462d645033cecbdb0dd0598599d92001322fe080797a5fc80cbc5a2b09b06f3fd3a554393d172c25ad61309bfb7cf939dc14516e892cd080109eea30e1d36108b7f689697637b7fd0a11b9eee44591a4f999dd6621dde33bb1e762de381660517862bc7e2df87d4f4ec3c9a637fba7dbfb6697fcbf053b8a6bbe4f178637000d9396e57dece851c54f265e23fbd5967e666fac53da87e002a951a385cf5a7456de26299545378e0ba81c74d5b5489fdb7f1954862b491df772aa648bc577d202a2e7931b75842ecaa2f53b4b672405e8d7bccbd70a689adcfcf5d1e2f5a408fe520aebc3bcc54729e7c66701e1921a9d98113a5a96ae1c46d77f6d8c1eacde36aad76cefbbc1861035efd9557f1cc23f701e746085de936aef5374f3589b50cf393b158921372a748e5e325c0783baeff3510ccd79c08705afc8fbd7260f5364585d9c1332ae4158c371abe9f77788f76c2830757825ebd9993fdeb685de945dc2f51207316dc038ee0c7bf6c1f13f2a017b5ddd87c42eebc66abdcb19a44cd933c6c008a2f54ff4de096a8c0abb562d9a1f689a7a9934eb9733e3b8abaa67ae526674872017f508bd388cfa7fd784517010c75202c35277841876f530b001342b4fb325b13e8d526e8e7c93c171c7cad00a0d237c0989601c61b2a2115dbc98f655ee67d624dfa129ecf75e66ac42c7f1409b36878823fd8bb77116d5b4aa7bfdb389e91e8654a074d0d309e4e05a9bb3b45035092e9fd23ebfb9dbd0ee4bb23b3b20a9634111739bcb18c4a5a6cd02d59ed9fd580a3332474d7872197851f228e66cbf039b06c09824d501dfa5f3d3353fc95a1d006ec4eff0579cb3eaf2cf24d08874443400f9a9e2b5689fa5dfc67db3859b818125dce5483785a7313102df55a49ae4a3e9dc5d06f6a93812de18fd8535592583855083c83a4c6f7bb40e241388dec222964efd5122d7fe4d5f61482fdca6650353b6f01006c500e0290cb42c8ee55a8002a13b4dbebee0d88c0c9ab34c722afcb8e910ad95f2dac17f6b61b577fa1bddded8866a85ae87a7dc22f8a2a9b8efc62778f2dd62c6b8db0320ee2ad5d06e0593dc0a009d265f658019955249a5223c7dd74ae96ca881c6f2fd7346dfd5c937e942d77a0b20ffe6d7236f07023b11fe1e0e797dae0e78ae952f0dc15286c29f241b08ae5f5a142415fa036341036d2fe1de4005b0e3aebdecaebaa21f752b9310a4b4c955d6b9762a72dda9311e42d79ee04d2ed61df3e07518f1833ca6c2abf5a43b27943f0962113453ec132e6b6ba9999548de1cb89b77266699a867f766ec48d23fa231c3e87320366498f104bdfc2f7ecc17b8a6829b12566a370e04353c41c36c06c8b6400a2a7811fa16a9897bd90bf908c8532db1bfd36abbff777ae196e28b39a0ae20ff098ada4ff29340b9661c7a132158ef563e897d39c9d0e4ded4b17fc7e29e3d3c7331a58ce893b07d17e470f5cde66099bb694877fae3af9eec55c77d2e1a4981c307807a5bdf5297f5a48a2c2c8eac7fcd794d7ee85fe19f47fb60dc04aabb66866fa8f7da1ee68cbfd279c5250ebe9003ad8d4c5f89c1d056bf130f95d4094990631ad71893cb755f647e9526c5053865ae0e42945f545b3abb55f38bb4c0e35aa7cb8084a0f5ee3cf1b399bdb76b544a1ac09b26b9623c41ce7a4abdc2ac6ebc663fe3b578663bcc4939dc662cc6b797f0bee8dd2515a7a6022424a75e864908c5dbf5b88f3a022189fae1bdf9f742e9801caceeba9355c8d002a240db3146af4508c3d172fccb755f2cd7992c623f232d03a91215298fa6b73f42117ea840ae6e56139edd24abcef4b834d8c2c749f09fc09ae7789651b865932fd6a6626d346ea5caa2e79c98af99fbba57ff99a4f3888f8a8629ae2b2e603a38a3d46adf687023066ebe875a82156e2784efbddc54b1457955efa2c296b06f90149a9ed83565f7326e9bf7a92b401bbb915cd6f6cce742e0a0508d0e4cd96f9f850d9c28a77cb04954927d62c4a859646c2a49eff11c0a524323d510e6eb510dbdd1cd5567ad6bc408569b407c477f6df96baf5b295e75b51f58890ae085af0085dc5739953131cd3bb4c405e4d4e8322897d39f4a9c0272c86484ee4d592e29fb201b2b96c5934b084a643cfb01be1f5adc5267bd48fd70bb485f459da5016e9b819f826587c5f4bdc01158fe62cee7e89409baa708956427c419666f3b0b70fb18dcf1b20299d74460e47f6da17e5b8304582240af2a95321dc9238b2ac3ac6878ee932fcdc8721dd6e3144798736b81933a9968e5a9fcd7438d6c1c01ed40c5c21c211e0a3e3e1d165ccaa717a63d8685344a318ddde2161e2ae3fee2bd49d5daeeaa0e5d519ecff2e872b2c6f59c2e318d5991e4eba8a94631b55e35746e1f1790d05f9a03d46139b084f360a0861c6c71c102f4f9cb5dda26f1ff9f571541f2b53fbe34359e58dacde86f6f1ac5c58b14bce7a383d62c90000eb14ac863e6e97b2e47061c9723ce52b1eff0f2dbd1568455466760c9f46a86b5fb755c6be2074b1ecded3ca2e911741b9ed771678b624937832470a329c377c76b229776467eed1280730e5df351d64ae05a2cc97ae25bb671deaf7891e7c6ad4f6053bf36b45b077749630c182ee94e82b8026cc8caa811c02366da97475689cb76da94da29e3d8f7bef938ca0bef4c60c446b6138d0c0cc0de9515b6b37815203a478cd3f8f278b8e74880d9b2a6da7dfaad05496f8fd2228dd7d7c87e2e16d2fd0fa9608910f5d9c4fb4a5730a0c3dabc5cf94dccf3e581a51369b413fc47456300c510ab44a726fa275857457342321b5ae87228f98226f124e5eed5e90ab1cefeafd351a3bc29a7ece87899f2c4a71aaf249e30d97c3a51686fbaf8df49ad30fea0adaebbec02a23b79109fbb02fd7ad355d78152647d43924c0b722c64a13dd80743d2abde78c4f1ac57fdd95c9c4354b00e1a0e27ae82f5c6c2784013941e8417e9961df28c1519b7c30614c1bf0d8fae9b992c084064ca2e44777486f384169dfe685d1d99862824aab89054fc9a6ec328d3e48ae19d13110ce3724e776c4541def08ebe0f6ab5d9769b22d5c69e95ca913c1b3317e37c7aaea2e621f53197058e3802bf9ffb0ff5beab8265af5658813c9b2279db73b1d29dd49cbcc5b80d22bb59fe01efcfe3207010de935eeb90875a44f5863504ec4d7672296234ff6520c360c2f7df789fe4d8d758abd1a76b2ce150bb45a11540862eaa5f410a1b78ce4c2f0129163e25d9997b8dc2aa5dc71b1d2f7fbed0fc6d89433791aa92549015488cc100a8a2d1eb16c95a8bc3bc03ad82588f9381fc9b1e3c57fc8aa764b74ba98948553dcb2a1985153a200486ea657e6deb5469ecdf1e2249bc10371b7961a5e6a7e9f57d17a34fc883035e74eb920037afd0321a3941f8127ffb878400b53215f6750defeb0672d32e52a89425c0243ab7009cbee357b14d3872361a5dcc8eec33928c7aff94a987e168e9f7ae5fc03649c2e306d5973d15355dec79eb22bb20742a38c4bc8bde8d210d711c7e20bfc766cee084d599d3e835fecda67874704ccdbe6d7d95c5f01d4ca75cd204ae905342f585b750586306ee2b98d140cbb5f246850a9c5fa7b6cf6e3a0d5714c68b401492de39a7e9ed85b2c325ab12d7c651d6a6b90854b4deb689c3c5fd4d123e320ee801cd88c0b10fd40c5ac26bd70f3614b93b6ee503b82f2c93a55689458c72f572a6962ad512645ed761032798042a59fdf69555efbddd4cb98b0a6140e3084b152d87c913156c2d2431367c3f64ac16189523b6814fc17f1c4eec440edf404d9507f3b6bd8eb2e6b2712cbc1f56423d3315b676a65dd60ee77fb5c8f955aaf483f75699340c1e1ed4ecf0959cc81d43e3590b3b704fcd7a31f85b4d1406afab55b74be5b96f40cb9879c65e5d113e757629a66e5c2506cdfc9d536109a08b8fd5a1e9e84468d64f41e8f3e782e69302d2f085ad0ef3f57c9d81e1628d56d86c2208bc7efd7c537c33f20a89d02089420452b15a280acc1911bec6227d2cbbe80baba555cb370818bec32b1e10730139ee6091b261a809abb5b3b5ef4d37ba7bb5de8bf503be177026bf2e14d5748dac1bb0dc7fc440a0270935281e34b773d93aea642e99274f87ef0e2b2fa9ddb408f3c80f72dfec7fe7e0e034d40e87f43f98053041e2e93c5c1670f637ed9817a57b60221d3bc2b8e2fb395b822a8d3196972ff4d498f009e635f2e9176ed00d94e9f10ef9d90c9f116d49d88295d467fd75fd925d2382cfc8f1c609007f39fd14b945a252588c8da3743caf867287c83f12250cfe2fa96d78f416fb2ffff5e42e1c50917e91cc5a4f29498743b7c92065e5e9c62cda14395369177d141daddaf294e6b5484d7a9d50fd40703b399787483289384b3e0030bae6b8373a92c9ea7a4579416b45e883af7590d7d9ae63c606cf95b0ea2578963534870471953f7e4f86523e23abd32c418d8dc3e4a01589208a4558c66d4a03735ca4580fe4968e1a92433f28fd4fa1134ddc5b4d6debecac1ac150c033efb08c32a34c1bd334acbd7af6fa440a1205cff17d0a3bb4608d8a5c119b073f902190540e60e39644e73f9d3c75e482664cc37140643a0a672b22b271ba221f3529c35293c617e741ea7092a9a4139cf4f1ec07de0a17dfcf77921cacfc5fe11b733014a0f8bedcc4c50b54c89bb34bf5a854f8b9dff4859aea681562f9d57aafdb2f3c19ef241bd50d03bef125367ca78e6b4bb454911abd5920a9e0dc7ea79e4635cab39ecd4c681cfd71d8e7947034de3d584a2930eb2e59c02c3f6185c42c27d58869785ab04176a8f75542cfee1ae523c725f981d87daba05842c12ba00f5f50339807a40529678d833baf70c12963253222d6c53c907e89c637990a5ff5686fe678fa6bb06f25cb0cbc73c2783d8b663ff89299439db0528bf6fc0df211923c8f1f91efb0420c994b28915f57efc72ac58c2c959b0a2e2219f15b1f0bc1ee2bd19c601e17ce701efab1e49a0e8f2d1aa38777c49feb717285c2eb96fcc941185cfe05e7aff764f3024eca3822aa0e6e797023134c1e5b5c2b599d34a355dbee57d1d14ec4932fd469246cd2d209c1487904ac84f873c282f1515e48b94c60802154c4d3cb17d202665c4334fb3541ba726a3a115514a72f228ed7073dddbdc244536a1936cf4c6610bdadf3521e6b511f1fbd2013e0a76c82cd721ce4276e4e3b444a073fa36040871d8b1e964d605c90a3c33"]}, 0x1010}, {&(0x7f0000002340)={0x110, 0x18, 0x10, 0x70bd28, 0x25dfdbff, "", [@generic="675e560bda6a93b0e72cffd346a37d8c1ed36a4ba2a97d11e632fba530441f5496286ee93fefea96b6323df1d9c013c1914b065591a586ebce53c082ce9ce09f46a9ad05b821889bf0b6fcdffa34b094c98fc797006f5b9029942856739ca483d81b1049d5609d8543a627cda53c968234de898a13e1f9ae0195d2ebc1bdbb5ffb5e24623468c07fbcd13dc4f1c83c6e2e4552ca564eb4dab28786e2b6ca49342a9febf62ac34507e75665b6b2916d61a1ffbf7ce4212fcd622a67c2447ffa4213761d90a8328933d4d977b0e43c8f520e4665da7f3feb46292ba029fd564c488d41a31638c32acec732b003f710f994889f3730e4007125", @typed={0x8, 0x4f, @fd=r4}]}, 0x110}, {&(0x7f0000002480)={0xa8, 0x2b, 0x200, 0x70bd2a, 0x25dfdbff, "", [@typed={0x14, 0x40, @ipv6=@local}, @generic, @nested={0x4, 0x63}, @nested={0x1c, 0x40, [@typed={0x18, 0x63, @binary="1344977ed52429f12ddab255be00d3aa5a"}]}, @typed={0xc, 0x89, @u64=0x1}, @typed={0x54, 0x57, @binary="4fb95af88b2225d3e429482093a4b75fbc8e444cab01bb46201ae5ac86359375df58666cfbfc1c4f59c4984f66455845389541d39cc3e07aa05730f16849262ea2633f3663a124caa937e22591f1"}, @typed={0x4, 0x16}]}, 0xa8}, {&(0x7f0000002540)={0x34, 0x2e, 0x100, 0x70bd2b, 0x25dfdbfe, "", [@typed={0x8, 0x76, @ipv4=@remote}, @generic="3ccac1db7465be6aa7356d4558243ac73c0bbab22cb62a8fd97c89d7"]}, 0x34}, {&(0x7f0000002600)={0x12a4, 0x32, 0x8, 0x70bd29, 0x25dfdbfd, "", [@nested={0xb8, 0x5f, [@generic="4bbc34b9293503580e723ff09e44e9329c32209bdc820ac66e0e6f3d7c3e094686bfac8d120f2b3e45f94615d87e00c65a5bc95f835a72d5f901a1b0ee217e87955fb38cdc7a02041f39638ec158f73d1a85491845a1aeda45afb5d374f721be7ee86afd0dc66a1a7059b8b7e4bd38e6131e120e1ecd8442de6637b16290b8110d9199c147c3fc2bcc2b652c85d821bfdd919c4135cd60a19d04a76a0014c3f2a7", @typed={0x8, 0x2b, @pid=r6}, @typed={0x4, 0x5f}, @typed={0x4, 0x90}]}, @nested={0x11a0, 0x8d, [@generic="87aa1891607080e70cad3214cd19a2c56cd83ef6bcb1f530e84801ffa8396cf8c98e2b0184023bb5b3e40d45833ef2ae21c12a6d65e6b644b8dfac07cc7d17892947a68aeac4e094be58d1b2353b31ce01c45b94588e75be48d4e15daba31e1f29519ea56a13cab4265e96663526e09e0cd931b9190308d9a5d7f7a02262d0ee46395bc58b7da576688395db3079b63b9402cc2a153b635e9764b6c34d4b666d", @generic="84406781c44d7fa704bd42270b45d0ba9f3595e889d5e6b13319dd913275df3c09ff9d2a179a5c9ff326d1b173ca7958baa1d84643144fc75c2b0b4b2a1ff478e2633a19696ab739a466efac1f504f88744fa9b8474d6df8f760029a50aba41a836caf570a0b09cf8f4f8879c3cafbdcbc5ae228c3e3e1840653834eb288111b6ed3662be632807b2af26c5dd292040c019657e02ad509c73db1c063a905ca1371ad2c2d7896bb97cec3d73f8cbb318f8da7a2f23e4ede465b1779b5f9d4", @typed={0x8, 0x62, @pid=r7}, @typed={0x8, 0x85, @ipv4=@local}, @typed={0xc, 0x27, @u64=0x7}, @generic="4d50398ed36c8027f89549e2b2b3576558ef0f626b5cbf41fdda4e1fcb1f560aaf", @generic="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"]}, @generic="3588600439b734435af155624d61145c8c1f5c4de1b3887bbb5c913a60d4720138a9d4f3d835e43764877e13fbe659080cb7c884a56dc6b7bf9df8"]}, 0x12a4}], 0x7, 0x0, 0x0, 0x10000}, 0x44051) r8 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r8) r9 = add_key(&(0x7f0000003a00)='.dead\x00', &(0x7f0000003a40)={'syz', 0x1}, &(0x7f0000003a80)="d388bc0046716e821326c2d5cc5a320a93346b322f8de3ac8f98ca4763f6d967afa87425beee3d4894e3039ba3bb6d78d415218b2d40b05a25", 0x39, r8) add_key$keyring(&(0x7f0000003980)='keyring\x00', &(0x7f00000039c0)={'syz', 0x2}, 0x0, 0x0, r9) write(r1, &(0x7f0000000000)="1f00000054000d0000000000fc07ff1b070404000400000007000100010039", 0x1f) 23:55:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80f20007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 578.293726] protocol 88fb is buggy, dev hsr_slave_0 [ 578.298912] protocol 88fb is buggy, dev hsr_slave_1 23:55:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa86020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa8df20007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 578.563901] protocol 88fb is buggy, dev hsr_slave_0 [ 578.569066] protocol 88fb is buggy, dev hsr_slave_1 23:55:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80022007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80025007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 578.803774] protocol 88fb is buggy, dev hsr_slave_0 [ 578.803856] protocol 88fb is buggy, dev hsr_slave_0 [ 578.808891] protocol 88fb is buggy, dev hsr_slave_1 [ 578.813979] protocol 88fb is buggy, dev hsr_slave_1 23:55:49 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 579.041908] selinux_nlmsg_perm: 54 callbacks suppressed [ 579.041921] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23302 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.066287] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.079250] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.092948] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.106099] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.119360] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.132676] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.146547] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.177487] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 [ 579.205694] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11918 comm=syz-executor.4 23:55:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80022007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:49 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$nfc_llcp(r4, 0x118, 0x0, &(0x7f0000000280)=""/155, 0x5d) [ 580.578178] IPVS: ftp: loaded support on port[0] = 21 [ 580.616231] device bridge_slave_1 left promiscuous mode [ 580.621722] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.664513] device bridge_slave_0 left promiscuous mode [ 580.670100] bridge0: port 1(bridge_slave_0) entered disabled state 23:55:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 23:55:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80025007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 583.246138] device hsr_slave_1 left promiscuous mode [ 583.288870] device hsr_slave_0 left promiscuous mode [ 583.336811] team0 (unregistering): Port device team_slave_1 removed [ 583.350273] team0 (unregistering): Port device team_slave_0 removed [ 583.360598] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 583.428341] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 583.517337] bond0 (unregistering): Released all slaves [ 583.589975] chnl_net:caif_netlink_parms(): no params data found [ 583.625102] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.631676] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.638805] device bridge_slave_0 entered promiscuous mode [ 583.646316] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.652968] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.660241] device bridge_slave_1 entered promiscuous mode [ 583.683363] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 583.693906] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 583.760810] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 583.777212] team0: Port device team_slave_0 added [ 583.789679] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 583.799076] team0: Port device team_slave_1 added [ 583.811619] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 583.821164] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 583.916610] device hsr_slave_0 entered promiscuous mode [ 583.954114] device hsr_slave_1 entered promiscuous mode [ 583.994487] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 584.001471] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 584.039160] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.045641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.052297] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.058702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.162538] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 584.170049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 584.182857] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 584.209723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.222997] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.250468] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.266733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 584.289607] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 584.296697] 8021q: adding VLAN 0 to HW filter on device team0 [ 584.310429] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 584.319422] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.325915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.351619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 584.361439] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.367912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.386213] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 584.394563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 584.409879] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 584.432840] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 584.450961] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 584.458345] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 584.473466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 584.482421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 584.508219] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 584.526980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 584.540175] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 584.556981] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 584.574427] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 584.697905] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 117768208)! [ 584.708679] EXT4-fs (loop3): group descriptors corrupted! 23:55:55 executing program 3: ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x11, r0, 0x82757000) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$inet(r1, &(0x7f00000058c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr, @local}}}, @ip_tos_u8={{0x11}}], 0x38}, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000001c0)={r3, 0x1, 0x6, @random="5ceb924b7f26"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) creat(0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) ftruncate(r6, 0x48280) io_submit(r7, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef4c7}]) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) 23:55:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:55 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0xfeffffff, 0x7, 0x0, 0xa9, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0xfffffec6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000000)=0x200000, 0x4) fchdir(r2) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020027b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:55 executing program 1: r0 = gettid() memfd_create(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x119641, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) unlink(&(0x7f0000000080)='./file0\x00') timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) tkill(r0, 0x1020000000016) 23:55:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020047b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 584.901138] selinux_nlmsg_perm: 6 callbacks suppressed [ 584.901154] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23302 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 [ 584.923781] net_ratelimit: 2 callbacks suppressed [ 584.923788] protocol 88fb is buggy, dev hsr_slave_0 [ 584.933935] protocol 88fb is buggy, dev hsr_slave_1 [ 584.938093] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 23:55:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() migrate_pages(r2, 0x5, 0x0, 0x0) 23:55:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed224182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f04cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) [ 585.043733] protocol 88fb is buggy, dev hsr_slave_0 [ 585.045891] protocol 88fb is buggy, dev hsr_slave_0 [ 585.048876] protocol 88fb is buggy, dev hsr_slave_1 [ 585.054220] protocol 88fb is buggy, dev hsr_slave_1 [ 585.101687] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 [ 585.168453] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 [ 585.252264] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 [ 585.265066] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 [ 585.277969] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 23:55:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa800200a7b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 585.294671] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 [ 585.307512] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 [ 585.320440] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=11953 comm=syz-executor.4 [ 585.363745] protocol 88fb is buggy, dev hsr_slave_0 23:55:55 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 585.551783] audit: type=1804 audit(1573602956.089:81): pid=11970 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir039569219/syzkaller.sNbmmV/1/bus" dev="sda1" ino=16625 res=1 23:55:56 executing program 1: syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) socket$inet6(0xa, 0x6, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 23:55:56 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x1100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x310) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x1100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r0) [ 586.485492] device bridge_slave_1 left promiscuous mode [ 586.490998] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.544365] device bridge_slave_0 left promiscuous mode [ 586.549819] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.675856] device hsr_slave_1 left promiscuous mode [ 586.716775] device hsr_slave_0 left promiscuous mode [ 586.758677] team0 (unregistering): Port device team_slave_1 removed [ 586.770676] team0 (unregistering): Port device team_slave_0 removed [ 586.781281] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 586.818623] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 586.913397] bond0 (unregistering): Released all slaves [ 587.530839] IPVS: ftp: loaded support on port[0] = 21 [ 587.680592] chnl_net:caif_netlink_parms(): no params data found [ 587.724916] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.731359] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.738797] device bridge_slave_0 entered promiscuous mode [ 587.746403] bridge0: port 2(bridge_slave_1) entered blocking state [ 587.752822] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.760278] device bridge_slave_1 entered promiscuous mode [ 587.786327] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 587.801836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 587.829609] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 587.843566] team0: Port device team_slave_0 added [ 587.853056] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 587.870025] team0: Port device team_slave_1 added [ 587.877192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 587.885382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 587.946581] device hsr_slave_0 entered promiscuous mode [ 588.014085] device hsr_slave_1 entered promiscuous mode [ 588.075781] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 588.085832] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 588.103309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 588.143079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 588.152445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 588.162049] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 588.168847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 588.177171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 588.186967] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 588.193048] 8021q: adding VLAN 0 to HW filter on device team0 [ 588.203130] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 588.214387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 588.222182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.230538] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.236925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.244631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 588.254548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 588.261760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 588.270464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.278240] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.284731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.294821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 588.305362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 588.312544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 588.320777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 588.333063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 588.344978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 588.352773] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 588.361124] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 588.371059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 588.378650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 588.387348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 588.398118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 588.405928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 588.413863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.425134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 588.433506] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 588.445164] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 588.451353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 588.459716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 588.468353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.482762] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 588.493149] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 588.499614] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 588.507689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 588.522247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 588.693727] protocol 88fb is buggy, dev hsr_slave_0 [ 588.698875] protocol 88fb is buggy, dev hsr_slave_1 23:55:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:59 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x1, 0xfd, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000000)=0x68) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0xa, 0x80805, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000001380)={0x2000}) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000013c0)=ANY=[@ANYBLOB="020000004ed4fe8e", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0xf, &(0x7f00000000c0)={r7, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000240)={r7, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000001280)={r8, @in={{0x2, 0x4e22, @multicast1}}}, &(0x7f0000001340)=0x84) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:55:59 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa800200e7b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:59 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(0x0, 0x3800000, 0x4000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa03cf57ebe97d9f17feb9ecbb902bba49b205a24242985ee7d785a97c5fedba0b23baadcc33fc133c1ad163188d2a87837a6796c1c66bb0443622369a069e4fddb47942e85245c06f9b1231317ba38b61ef1f7aec4d53c1ad490aa5a944af7666ac09e30f8d4da8130f5129", 0xcb, 0x1a0}]) 23:55:59 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) 23:55:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa800200f7b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:59 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9067f076748b4", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e7d3b9df6001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9b}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 23:55:59 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:55:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:55:59 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) accept(r3, 0x0, &(0x7f0000000000)) [ 589.025841] loop1: p1 < > p4 [ 589.040076] loop1: partition table partially beyond EOD, truncated 23:55:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020607b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:55:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 589.129578] loop1: p1 size 2 extends beyond EOD, truncated [ 589.163539] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 589.198065] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 23:55:59 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 589.265030] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 23:55:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020df7b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 589.329845] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 589.353970] EXT4-fs (loop3): mount failed [ 589.370525] loop1: p4 start 1854537728 is beyond EOD, truncated 23:56:00 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x2, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) fsetxattr$security_smack_transmute(r5, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) [ 589.576096] device bridge_slave_1 left promiscuous mode [ 589.582440] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.665262] loop1: p1 < > p4 [ 589.668837] device bridge_slave_0 left promiscuous mode [ 589.674578] loop1: partition table partially beyond EOD, truncated [ 589.682277] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.698280] loop1: p1 size 2 extends beyond EOD, truncated 23:56:00 executing program 1: r0 = socket$tipc(0x1e, 0x1, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000000)) 23:56:00 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000140)) 23:56:00 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b02090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 589.720232] loop1: p4 start 1854537728 is beyond EOD, truncated 23:56:00 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(0x0, 0x3800000, 0x4000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa03cf57ebe97d9f17feb9ecbb902bba49b205a24242985ee7d785a97c5fedba0b23baadcc33fc133c1ad163188d2a87837a6796c1c66bb0443622369a069e4fddb47942e85245c06f9b1231317ba38b61ef1f7aec4d53c1ad490aa5a944af7666ac09e30f8d4da8130f5129", 0xcb, 0x1a0}]) 23:56:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b04090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b0a090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:00 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) read$usbfs(r0, 0x0, 0x0) [ 590.077031] loop3: p1 < > p4 [ 590.083814] loop3: partition table partially beyond EOD, truncated [ 590.098230] device hsr_slave_1 left promiscuous mode [ 590.143173] loop3: p1 size 2 extends beyond EOD, truncated [ 590.156032] device hsr_slave_0 left promiscuous mode [ 590.243078] loop3: p4 start 1854537728 is beyond EOD, truncated [ 590.291979] team0 (unregistering): Port device team_slave_1 removed [ 590.359336] team0 (unregistering): Port device team_slave_0 removed [ 590.403742] protocol 88fb is buggy, dev hsr_slave_0 [ 590.408878] protocol 88fb is buggy, dev hsr_slave_1 [ 590.442073] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 590.456559] loop3: p1 < > p4 [ 590.471150] loop3: partition table partially beyond EOD, truncated [ 590.500369] loop3: p1 size 2 extends beyond EOD, truncated [ 590.511597] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 590.533103] loop3: p4 start 1854537728 is beyond EOD, truncated [ 590.732330] bond0 (unregistering): Released all slaves [ 591.928698] IPVS: ftp: loaded support on port[0] = 21 [ 591.994070] chnl_net:caif_netlink_parms(): no params data found [ 592.028977] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.035508] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.042710] device bridge_slave_0 entered promiscuous mode [ 592.050181] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.056828] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.064026] device bridge_slave_1 entered promiscuous mode [ 592.080988] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 592.090265] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 592.109589] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 592.116955] team0: Port device team_slave_0 added [ 592.122429] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 592.129853] team0: Port device team_slave_1 added [ 592.135315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 592.142701] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 592.216592] device hsr_slave_0 entered promiscuous mode [ 592.254173] device hsr_slave_1 entered promiscuous mode [ 592.324401] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 592.331438] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 592.348837] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.355243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 592.361891] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.368302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 592.409748] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 592.416657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 592.426094] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 592.435617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 592.443165] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.450004] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.457614] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 592.468394] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 592.475434] 8021q: adding VLAN 0 to HW filter on device team0 [ 592.485215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 592.492921] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.499408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 592.509862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 592.518376] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.524783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 592.545336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 592.553061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 592.564700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 592.571679] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 592.584659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 592.592883] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 592.599123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 592.617726] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 592.625985] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 592.632668] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 592.644004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 592.824195] protocol 88fb is buggy, dev hsr_slave_0 [ 592.829320] protocol 88fb is buggy, dev hsr_slave_1 23:56:03 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b0e090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000280)="240000001a005f0014f9e407000904000200000000000000000e000008001b0001000000", 0x24) 23:56:03 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:03 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) sendto$isdn(r0, &(0x7f0000000280)={0x10001, 0x45e4, "ebde2349264a0a"}, 0xf, 0x1, &(0x7f00000002c0)={0x22, 0x3, 0x0, 0x3, 0x6}, 0x6) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x2, &(0x7f0000000200)='procsystemsystem[cpusetwlan0cgroup\x00') [ 592.943742] protocol 88fb is buggy, dev hsr_slave_0 [ 592.948867] protocol 88fb is buggy, dev hsr_slave_1 [ 592.964754] selinux_nlmsg_perm: 84 callbacks suppressed [ 592.964768] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 23:56:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b0f090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:03 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r6, 0x111, 0x2, 0x1, 0x4) [ 592.990874] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 593.003474] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 [ 593.024738] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 [ 593.050542] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 593.063764] protocol 88fb is buggy, dev hsr_slave_0 [ 593.068880] protocol 88fb is buggy, dev hsr_slave_1 23:56:03 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 593.099181] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 [ 593.123725] protocol 88fb is buggy, dev hsr_slave_0 [ 593.128926] protocol 88fb is buggy, dev hsr_slave_1 23:56:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:03 executing program 3: syz_open_dev$dri(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r3, 0x2007fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f0000000200)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000000000, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:56:03 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x4004, &(0x7f0000000240)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@common=@version_9p2000='version=9p2000'}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0xd8, 0x36, 0x62, 0x34, 0x31, 0xe, 0x62], 0x2d, [0x2b, 0x30, 0x6, 0x64], 0x2d, [0x65, 0x32, 0x52, 0x38], 0x2d, [0xc7551e37abef9f1d, 0x66, 0xaf, 0x65], 0x2d, [0x64, 0x62, 0x3bb21261a91bb43b, 0x61, 0x32, 0x62, 0x39, 0x66]}}}, {@subj_type={'subj_type', 0x3d, 'ppp1+*.#!md5sumeth0keyring'}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, 'security'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@permit_directio='permit_directio'}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x400, 0x8004}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) [ 593.142332] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 23:56:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b60090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 593.264414] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 23:56:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 593.310427] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 23:56:03 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 593.384955] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 [ 593.402661] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 [ 593.434078] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12113 comm=syz-executor.4 23:56:04 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:04 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept$ax25(r4, 0x0, &(0x7f0000000000)) 23:56:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007bdf090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:04 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090280000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:04 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x4, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x222) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:04 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 593.928994] device bridge_slave_1 left promiscuous mode [ 593.937243] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.028732] device bridge_slave_0 left promiscuous mode [ 594.034445] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.096411] audit: type=1804 audit(1573602964.639:82): pid=12145 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir039569219/syzkaller.sNbmmV/8/file0/file0" dev="loop3" ino=114 res=1 23:56:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) 23:56:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090480000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:04 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) [ 594.297350] device hsr_slave_1 left promiscuous mode [ 594.355257] device hsr_slave_0 left promiscuous mode [ 594.408269] team0 (unregistering): Port device team_slave_1 removed [ 594.444446] team0 (unregistering): Port device team_slave_0 removed [ 594.468640] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 594.538998] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 594.647841] bond0 (unregistering): Released all slaves [ 594.720439] Started in network mode [ 594.724837] Own node identity ff010000000000000000000000000001, cluster identity 4711 [ 594.735866] Enabling of bearer rejected, failed to enable media [ 595.754564] IPVS: ftp: loaded support on port[0] = 21 [ 595.859030] chnl_net:caif_netlink_parms(): no params data found [ 595.911137] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.917770] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.925055] device bridge_slave_0 entered promiscuous mode [ 595.932036] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.938542] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.945678] device bridge_slave_1 entered promiscuous mode [ 595.965197] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 595.974802] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 595.991922] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 595.999574] team0: Port device team_slave_0 added [ 596.005344] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 596.012524] team0: Port device team_slave_1 added [ 596.017961] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 596.025402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 596.096652] device hsr_slave_0 entered promiscuous mode [ 596.134115] device hsr_slave_1 entered promiscuous mode [ 596.184327] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 596.191501] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 596.205830] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.212212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.218889] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.225291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.261803] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 596.268600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 596.277312] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 596.287580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 596.295194] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.301927] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.309623] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 596.320359] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 596.326926] 8021q: adding VLAN 0 to HW filter on device team0 [ 596.337935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 596.345911] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.352435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.362862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 596.371369] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.377780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.397336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 596.405890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 596.413613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 596.425439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 596.436466] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 596.448912] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 596.455532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 596.462788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 596.476624] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 596.484667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 596.491370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 596.502292] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 596.646194] net_ratelimit: 8 callbacks suppressed [ 596.646216] protocol 88fb is buggy, dev hsr_slave_0 [ 596.656693] protocol 88fb is buggy, dev hsr_slave_1 [ 596.673812] protocol 88fb is buggy, dev hsr_slave_0 [ 596.678943] protocol 88fb is buggy, dev hsr_slave_1 23:56:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:07 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:07 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f00000001c0)={0x8, {{0xa, 0x4e24, 0x1, @rand_addr="bbe4fc4e825f615c512e5308f34ed5b8", 0x5}}, {{0xa, 0x4e21, 0xfffffffc, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca}}}, 0x108) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090a80000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:07 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x0) 23:56:07 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) 23:56:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090e80000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x40000100], [0xc1]}) 23:56:07 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x6, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @local}, &(0x7f0000000a00)=0xc) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r3, &(0x7f00000000c0)=[{{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@pktinfo={{0x24, 0x29, 0x32, {@dev, r5}}}], 0x28}}], 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000000f80)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x5, @empty, 0x1}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000000c0)="1c2a7e0a743bed70932d7eac75800a2ac50273692387bed7036ffe260496184f693e8347c8d91f1a7cdb98f4fff2232ff6c572ca385a122b0dd36dcb92404dd3158eec3f6ea0ae1cf4ae0dc71486011baef7d43e20c22b15fb7284dcb8717934d258d5e10ca41a2f6bf78f1e61b4e8586d8a14d708de87c63d1697eaabc83683ced585dc373340e10115fc38c50c2cd8dc796ec5564f7a7d3e4f073baaa7fbf83824de6d7a2f488240bc1837be27d4c7dd43db7f18163f", 0xb7}], 0x1, &(0x7f00000001c0)}}, {{&(0x7f0000000200)={0xa, 0x4e21, 0x333, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xf31}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000340)="8b5ee205b2bec0bd0ffa04083c874b398565b90b18a04ae1df60254b15b747ba63080183b60108775432578446ea5113474d49f31cd481e6b0d3bc99211fe4844d47b0", 0x43}], 0x1, &(0x7f00000003c0)=[@hopopts_2292={{0x38, 0x29, 0x36, {0x3c, 0x3, [], [@pad1, @ra={0x5, 0x2, 0xa3}, @enc_lim={0x4, 0x1, 0x3}, @pad1, @enc_lim={0x4, 0x1, 0x2}, @enc_lim={0x4, 0x1, 0x1c}, @jumbo={0xc2, 0x4, 0x1}]}}}], 0x38}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000400)="3adae0eb77021bde5801de7cc382923107805a53126f24b5287f3f90fbb91b465a33badfb753fb7c240b564d363499cc6d244758293bd52cffa030b575022ef10331c05d2a32e3ef945432ceef26f9a54f21f632b7e2c506fd2d6ef7508f0c3f094c3be95fa8197202dd50f8a17b8d856f5911d6f0f371c70b6ac65902ff6b9fc95c8745318ad67b9af5e6a23abd675fe001a1679ee96825632ae1a13bec1e01061bf9f4f30e11", 0xa7}, {&(0x7f00000004c0)="af14c6291db830817e1368145bedda0d7de03bacdaaa04428844e3ffa7b3dd69b45159b996741fe9777f5544a29175a7bd765cc678790e9c9720929559db9677a2dab68f278ca44d476374f662959d5d7c3cc7369d4d2f3ca0326669bb68d931e880ab07e20794aa6d0d6923789ce982c7e0", 0x72}, {&(0x7f0000000540)="1af0de83ca523973bace77e97d144281f46674af9678ab53eea054011bc0006df3de98321ac6f4ce1579d3b6bfa2b570ce9f20256f6af2466af0b00329a32e46bbd1651d68b7949a368032ffc7cc329cb15a39b732787d09ce5b5a4ada0d78836c0d3696276ddb9e39fe8e389bdfde379ee0aa5e9c416950e2a773d160100013b7da5d40f06fd9940f215c63057fa9664d4a895cb50c2acd39ab774ff3f0464133f76d424032", 0xa6}, {&(0x7f0000000600)="efa722b3c46d23de37ce392d8f83e2945507fbb5d5bc4b15b6252b10b9289fd924402a0002bba97e2ccc5d542f8c9962171dc2db5f1b4933a545982942d41badaa55a5369fcf3721033144188698c140afc382fcc8f950d524682c54be3ce011bd09674b2d37ddd1d856daf27a19bd91016ad1454b775e329805c47786e3ed95a5b7ce9cbd6f2ba29f6cdded37e2d048e1cf00b32c6e5caba9800b9d7286d19f6ccf2dc7ac365f4e3c2cb930d8db49c3b5bfc3fa80e779f6e415186e8674fa2ed9b1a8810fa644f190548fbf6343079ed92e44ae9d0dd03ad0a10788cf2558e537da41c1860aa663d9d08ff8d234e0913c9053b4958ce9", 0xf7}, {&(0x7f0000000700)="73bb5e269dcf16fb70f06e7ecbb18c08433333a4b0a462b50025b32f0cec3abe146ab866fe7c893ba935733d1b2b17578dcaf9214e020306e166ec20bdb09a25c1506341634ad5c63289047dd479b42358003d9ec2f6bb2735e0e279793b638c7628172d4b9fa96315dcb55e6d6fbe9be8829860cd55b97a80c412a6b1ec6e6f766c87d4f4", 0x85}, {&(0x7f00000007c0)="4587d473040280e069386de9788af221f395d25abc5bdf409e4357f34ba97aca4fabbb0e75f156178e74c1ea23ba2233b01df45250502dbff70c694b95183b9f3cd73d02dbdf6b94ac901ad9629a83dacd69817c9a2389c26f55b43258817190ede6630edb705af611727b169049953b03e5efcdc577c9f638468d6d6a60c43c581fe7323d44a951b8eb3968f4f92961d67e69f2ead9e72330b00fd2ddae339b51df04ea", 0xa4}, {&(0x7f0000000880)="995b56d30848a5ef5b9cba3686f5f6885748fca48e31705e670b6110536e0739f6dbce7b307a0fc224ba22cf46b0cbe6f7648be9d796b29ddedbf94e0657b00a9cb905abf9c2a1a6a419eb9801742495eaaca1aa3739f196e37b827fbb25ddb8cbc4a5f921370b72cb7fa5a31ea6a9481809ac0d889622df97589264097cc08d245825db1933fa6dfdc617a40be3995a826b4cb0a1fce0", 0x97}], 0x7, &(0x7f0000000a40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @rand_addr=0x1}, r2}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7fff}}], 0x40}}, {{&(0x7f0000000a80)={0xa, 0x4e22, 0x3ff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3}, 0x1c, &(0x7f0000000e00)=[{&(0x7f0000000ac0)="a4", 0x1}, {&(0x7f0000000b00)="22d731201f8737d80660292159c2c03e", 0x10}, {&(0x7f0000000b40)="ceaad2e2e625ade37b2d76e394f31771b7dc7849efecd4259f8e9f222b7b2ced8080311d23c4dceacec6184f1a3084206e00b11ba1edf9c3088dacb139f419ff910b331528a19bf73dd42a2b982f9a7bf8679d038e295bf3926f1e07726ca9764cdd4fda8c28b32c8b7b22b5a6c3f83a3df7784a67a33c6cbf037a1c27e75d6b0cd2a454842277985bcda019474ad07e514a15783b0cde", 0x97}, {&(0x7f0000000c00)="034d705327b8dd5d83d97c76127ba135420404ad7ef7b55a444d928406be92981d753946197ae63cc894b9fb529eb5544e69781bec92612a45e648e59509fe792faa089a832ef505a01dfe27", 0x4c}, {&(0x7f0000000c80)="9b7fda556e1c07d830c8e1f6036b9f", 0xf}, {&(0x7f0000001080)="8f905cb7e76cc05c5e74dbe23f94b50552da18c2ce1aa8783b6463bfd16d3d9dcc98c64c98e347cd5fadfdc7457f969f129d410b7583bb84170df08954b4c4ff5fdc889be4e4aa59d102d32a3e6d594598eaa2e91229f2e1b17e1b8b74de6105da3b6b0d48af93b97d0779f7488a2bcb75db7ab54f66a8790911131eaab5e2c31f5934f46998a403da5aba1144a5b5de489858616c2d318cc724cad3b365dd2167e179a083405a9b79437a87b7d614a1d8b84fa215754840eb00b82012e8e6c2761e57580ea7b9e7b46c5587f34cc2d17a0904f7d6245abdd28eddc8a83f0a63cb7934cdc8f7a54d30f190476f84ad9938763cef2fd82cbc34811d0e180516c04e75eec03aae58edf0076a811cf15ad2809fbf2f003259c8a5aa0e1c6283695b621a3488e48390b1529e16c9e1f5004aefa62f4230961b44bcee0d7b341b811b617e4169de15af50b70292945794c8ba821282fbcf026e225fd087fd6578", 0x15e}, {&(0x7f0000000d80)="322c021ee0821c2f260ec641648f507c0609f86915c85e82776e717deb36108ce1e4af3ce7708d99d5c6cd4ea9e4775e5dc36e5a7e24ecb1bb6d37d8a2fce6cd5dfa7600b20f72f882d84b5261569622d25486", 0x53}], 0x7, &(0x7f0000000e80)=[@dontfrag={{0x14, 0x29, 0x3e, 0x8000}}, @hoplimit={{0x14, 0x29, 0x34, 0x1}}, @rthdr={{0x18, 0x29, 0x39, {0x2, 0x0, 0x4, 0x9}}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr="ee44041d4187e9558be3b46db64c36e5", r5}}}, @dstopts={{0x20, 0x29, 0x37, {0x2f, 0x0, [], [@pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x7}}, @flowinfo={{0x14, 0x29, 0xb, 0x101}}], 0xc0}}], 0x4, 0x20) r6 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000280)=""/157, 0xc5) 23:56:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:07 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, 0x0, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090f80000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:07 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f00000006c0)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000070000000400000078040000580200000000000058020000900300009003001d1fd93d085dfb7caf009003000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"], 0x4c8) 23:56:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x5, [0x40000100], [0xc1]}) 23:56:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00096080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:07 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, 0x0, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 597.516233] device bridge_slave_1 left promiscuous mode [ 597.521895] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.567287] device bridge_slave_0 left promiscuous mode [ 597.574276] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:08 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) 23:56:08 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000000)={0xe72, 0x7fff, 0x2}) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b0009df80000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:08 executing program 3: 23:56:08 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, 0x0, 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080020efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:08 executing program 3: r0 = socket$inet(0x2, 0x2000000080002, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000280)) [ 597.843764] protocol 88fb is buggy, dev hsr_slave_0 [ 597.848939] protocol 88fb is buggy, dev hsr_slave_1 [ 597.886481] device hsr_slave_1 left promiscuous mode 23:56:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080040efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 597.939784] device hsr_slave_0 left promiscuous mode [ 597.998333] team0 (unregistering): Port device team_slave_1 removed [ 598.071479] team0 (unregistering): Port device team_slave_0 removed [ 598.113374] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 598.198639] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 598.340509] bond0 (unregistering): Released all slaves [ 599.438320] IPVS: ftp: loaded support on port[0] = 21 [ 599.532868] chnl_net:caif_netlink_parms(): no params data found [ 599.579021] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.586699] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.594322] device bridge_slave_0 entered promiscuous mode [ 599.601568] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.609503] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.617144] device bridge_slave_1 entered promiscuous mode [ 599.638639] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 599.647670] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 599.665648] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 599.672952] team0: Port device team_slave_0 added [ 599.678634] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 599.686192] team0: Port device team_slave_1 added [ 599.691464] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 599.698862] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 599.765881] device hsr_slave_0 entered promiscuous mode [ 599.814155] device hsr_slave_1 entered promiscuous mode [ 599.864307] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 599.871386] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 599.886081] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.892461] bridge0: port 2(bridge_slave_1) entered forwarding state [ 599.899215] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.905614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 599.942159] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 599.948523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 599.957532] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 599.967615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 599.975578] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.982359] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.990016] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 600.000662] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 600.008030] 8021q: adding VLAN 0 to HW filter on device team0 [ 600.018979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 600.026893] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.033351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 600.043156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 600.051387] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.057806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 600.076708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 600.092673] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 600.103263] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 600.114251] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 600.120881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 600.128541] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 600.136336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 600.144626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 600.152265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 600.168560] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 600.176425] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 600.183147] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 600.195972] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 600.365181] protocol 88fb is buggy, dev hsr_slave_0 [ 600.370630] protocol 88fb is buggy, dev hsr_slave_1 23:56:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:11 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="640f0175490f01b6000000000f01df0f01c5c74424005028aacac744240297000000c7442406000000000f011c24b9b00300000f32f00fc78b0f0000000f01d1b8010000000f01c1dadd", 0x360}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$netlink(0x10, 0x3, 0x0) 23:56:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b000900800a0efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:11 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getdents(r2, &(0x7f00000001c0)=""/84, 0x54) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000000), &(0x7f00000000c0)=0x4) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:11 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b000900800e0efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 600.573782] selinux_nlmsg_perm: 95 callbacks suppressed [ 600.573797] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 [ 600.593770] protocol 88fb is buggy, dev hsr_slave_0 [ 600.598865] protocol 88fb is buggy, dev hsr_slave_1 23:56:11 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) [ 600.634918] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 23:56:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:11 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b000900800f0efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 600.719053] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 [ 600.745176] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 [ 600.778039] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 23:56:11 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) [ 600.850518] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 23:56:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080600efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 600.899388] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 [ 600.977126] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 [ 601.031884] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 [ 601.069449] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12290 comm=syz-executor.4 [ 601.314745] device bridge_slave_1 left promiscuous mode [ 601.320274] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:11 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080df0efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:11 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f00000001c0)) r1 = gettid() tkill(r1, 0x1000000000013) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ip_vs_stats\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000000c0)={0x7, 0x0, 0xa927, 0x3ff, 'syz0\x00', 0xfff}) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000200)={0x3, 0x0, [{0x80000001, 0x3ff, 0x5, 0x1000, 0x6, 0x7, 0xffff}, {0x1, 0xa4, 0x4, 0x4, 0x2, 0x0, 0x8}, {0x2, 0x3f, 0x0, 0x8, 0x8, 0x5, 0x1}]}) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:11 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 23:56:11 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 601.365704] device bridge_slave_0 left promiscuous mode [ 601.371273] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809020000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:12 executing program 3: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000600), 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x18) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40000, 0x18) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000080)) dup2(r1, r2) syz_open_procfs(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) bind(0xffffffffffffffff, &(0x7f0000001180)=@nl=@unspec, 0x80) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002c40)={0x0, 0x0, &(0x7f0000002c00)={&(0x7f0000000900)=ANY=[@ANYRES16, @ANYBLOB="000225bd7000fbdb", @ANYRES32, @ANYBLOB="0500"], 0x4}, 0x1, 0x0, 0x0, 0x800}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0x6) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r3, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) 23:56:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809040000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 601.671610] device hsr_slave_1 left promiscuous mode [ 601.683767] net_ratelimit: 6 callbacks suppressed [ 601.683774] protocol 88fb is buggy, dev hsr_slave_0 [ 601.684015] protocol 88fb is buggy, dev hsr_slave_0 [ 601.688762] protocol 88fb is buggy, dev hsr_slave_1 [ 601.693951] protocol 88fb is buggy, dev hsr_slave_1 [ 601.742212] device hsr_slave_0 left promiscuous mode 23:56:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe8090a0000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 601.819838] team0 (unregistering): Port device team_slave_1 removed [ 601.914331] team0 (unregistering): Port device team_slave_0 removed 23:56:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe8090e0000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 601.984026] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 602.004053] protocol 88fb is buggy, dev hsr_slave_0 [ 602.009521] protocol 88fb is buggy, dev hsr_slave_1 [ 602.077948] bond0 (unregistering): Releasing backup interface bond_slave_0 23:56:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe8090f0000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:12 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 602.304853] bond0 (unregistering): Released all slaves [ 603.913700] IPVS: ftp: loaded support on port[0] = 21 [ 603.981770] chnl_net:caif_netlink_parms(): no params data found [ 604.021357] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.027938] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.035357] device bridge_slave_0 entered promiscuous mode [ 604.042394] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.048927] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.056063] device bridge_slave_1 entered promiscuous mode [ 604.075409] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 604.084863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 604.105837] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 604.113244] team0: Port device team_slave_0 added [ 604.119184] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 604.126874] team0: Port device team_slave_1 added [ 604.132255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 604.139717] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 604.196736] device hsr_slave_0 entered promiscuous mode [ 604.234737] device hsr_slave_1 entered promiscuous mode [ 604.279006] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 604.286253] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 604.301944] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.308393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.315101] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.321471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.360717] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 604.367125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 604.379578] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 604.388948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 604.397818] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.405075] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.435759] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 604.461848] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 604.468504] 8021q: adding VLAN 0 to HW filter on device team0 [ 604.487361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.501470] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.507945] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.531802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 604.546648] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.553082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.578159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 604.590250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 604.611643] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 604.621793] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 604.632555] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 604.639316] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 604.646890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 604.655056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 604.662670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 604.679636] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 604.687330] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 604.694340] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 604.706075] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 604.873813] protocol 88fb is buggy, dev hsr_slave_0 [ 604.878963] protocol 88fb is buggy, dev hsr_slave_1 23:56:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809600000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:15 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:15 executing program 3: 23:56:15 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, 0x0, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:15 executing program 2: bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x3, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)=ANY=[@ANYBLOB="03000000", @ANYRES16=r5, @ANYBLOB="000027bd7000fedbdf250600000024000100100001007564703a73797a31000000000800030000000000080003000300000008000600040002006c00050024000200080003000000000008000400ff070000080002005408000008000200000000000c00020008000200000000002c000200080003000900000008000400070000000800040008000000080003000080000008000200010000000c0002000800020006000000"], 0xac}}, 0x40) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4887453cb92b2b23}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="dc020400", @ANYRES16=r5, @ANYBLOB="000428bd7000fedbdf2512000000d80004001c0007000800030004000000080004000180000008000200060000001c00070008000200000000000800040008000000080002000100010034000700080002000500000008000200010000000800020007000000080002000180000008000300cb01000008000200080000000c00010073797a31000000001c000700080004007000000008000400ff7f0000080004000200000014000700080002000400000008000400010400001400010062726f6164636173742d6c696e6b00000c00010073797a30000000000c00010073797a31000000002c000900080002000500000008000200f9ffffff08000200050000000800020059f1ffff08000100070000009000010008000300000000002c00020008000300ff0f0000080002000100008008000200002001000800020006000000080003000100000014000200080001001e000000080001001d0000001400010069623a76657468315f746f5f687372000c0001006574683a6c6f00002400020008000100170000000800030007000000080001000f00000008000300ff0100001c000200080002006bc70000080001000700000008000100050000007000050008000100657468001c0002000800040000000000080001001800000008000200070000000c0002000800010019000000340002000800030006000000080002000600000008000300ff0700000800010014000000080003000500000008000400f8ffffff0800010075647000300007000c0003003f000000000000000c000300010000000100000008000200070000000c000400020000000000000008000600040002002c00020004000400080002000300000004000400080001000500000008000200010000000800020001000080440009000800020001040000080002009100000008000200ff0f000008000100070000000800010009000000080001000800000008000200000000000800020000100000"], 0x2dc}, 0x1, 0x0, 0x0, 0x41050}, 0x4000) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:15 executing program 3: 23:56:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809df0000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:15 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000140)={0x3, @null, r4}) r5 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f00000001c0)=""/159, 0xfffffffffffffe96) 23:56:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:15 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:15 executing program 3: 23:56:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809f00000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:15 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = fcntl$dupfd(r1, 0x605, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:15 executing program 3: 23:56:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 605.654862] device bridge_slave_1 left promiscuous mode [ 605.661628] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.714696] device bridge_slave_0 left promiscuous mode [ 605.721132] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:16 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, 0x0, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:16 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000a00ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:16 executing program 3: 23:56:16 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) [ 605.935638] selinux_nlmsg_perm: 50 callbacks suppressed [ 605.935655] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 23:56:16 executing program 3: 23:56:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000e00ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 605.992242] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 [ 606.056952] device hsr_slave_1 left promiscuous mode [ 606.057909] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 23:56:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="640f0175490f01b6000000000f01df0f01c5c74424005028aacac744240297000000c7442406000000000f011c24b9b00300000f32f00fc78b0f0000000f01d1b8010000000f01c1dadd", 0x360}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000380)={0x0, 0x40000094, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x8) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[]}}, 0x0) [ 606.108458] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 [ 606.108789] device hsr_slave_0 left promiscuous mode 23:56:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000f00ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 606.163749] protocol 88fb is buggy, dev hsr_slave_0 [ 606.167338] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 [ 606.168908] protocol 88fb is buggy, dev hsr_slave_1 [ 606.253032] team0 (unregistering): Port device team_slave_1 removed [ 606.262542] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 [ 606.306975] team0 (unregistering): Port device team_slave_0 removed [ 606.324120] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 [ 606.342265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 606.364027] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 23:56:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809006000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 606.402535] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 [ 606.451487] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 606.467748] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12417 comm=syz-executor.4 23:56:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900df00ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 606.709971] bond0 (unregistering): Released all slaves [ 608.280347] IPVS: ftp: loaded support on port[0] = 21 [ 608.358047] chnl_net:caif_netlink_parms(): no params data found [ 608.391406] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.397985] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.405441] device bridge_slave_0 entered promiscuous mode [ 608.412445] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.418976] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.426070] device bridge_slave_1 entered promiscuous mode [ 608.443933] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 608.453023] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 608.471148] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 608.478715] team0: Port device team_slave_0 added [ 608.485280] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 608.492540] team0: Port device team_slave_1 added [ 608.497976] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 608.505317] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 608.556814] device hsr_slave_0 entered promiscuous mode [ 608.594039] device hsr_slave_1 entered promiscuous mode [ 608.645249] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 608.652315] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 608.668188] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.674618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.681261] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.687701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.723204] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 608.729870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 608.740082] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 608.749376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.757475] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.764724] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.771803] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 608.783143] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 608.790560] 8021q: adding VLAN 0 to HW filter on device team0 [ 608.800196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.808998] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.815424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.834828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 608.842415] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.848826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.857262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 608.865656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 608.879805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 608.895200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 608.902719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 608.913026] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 608.920314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 608.933585] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 608.941243] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 608.948906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 608.960469] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 609.123758] protocol 88fb is buggy, dev hsr_slave_0 [ 609.128922] protocol 88fb is buggy, dev hsr_slave_1 [ 609.143755] protocol 88fb is buggy, dev hsr_slave_0 [ 609.148907] protocol 88fb is buggy, dev hsr_slave_1 23:56:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:19 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, 0x0, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900f000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:19 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc9, &(0x7f0000000140), &(0x7f00000000c0)=0x4) 23:56:19 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:19 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0xa, 0x80805, 0x0) close(r5) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_mreq(r8, 0x0, 0x23, &(0x7f0000000240)={@rand_addr, @broadcast}, &(0x7f0000000280)=0x8) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0xf, &(0x7f00000000c0)={r10, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000000)={r10, 0x3}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r11, 0xe5}, &(0x7f0000000200)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) waitid(0x1, 0x0, 0x0, 0x0, 0x0) pipe(0x0) 23:56:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000200ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:19 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c4406"], 0x5) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000400ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:19 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x50c000, 0x0) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:20 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c4406"], 0x5) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 609.944373] device bridge_slave_1 left promiscuous mode [ 609.949879] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.004833] device bridge_slave_0 left promiscuous mode [ 610.010409] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:20 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = memfd_create(&(0x7f0000000280)='em0)[vmnet0md5sum\x00', 0x0) ftruncate(r4, 0x40000) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x67) sendfile(r3, r4, 0x0, 0xffe4) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000500)={0x9, 0x5, 0x1, 0x2, 0xa, [{0x800, 0x83, 0x7, 0x0, 0x0, 0x802}, {0x4, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x37003a0a1402f50b}, {0x6, 0xd445, 0x5, 0x0, 0x0, 0xa43b6bcfa4153975}, {0x20, 0xfffffffffffffffd, 0x4}, {0x81, 0x100, 0x0, 0x0, 0x0, 0x298e35039b732544}, {0x1, 0x0, 0x2, 0x0, 0x0, 0x2}, {0x10001, 0x9, 0x8}, {0x40, 0x2, 0x7, 0x0, 0x0, 0x80}, {0x7, 0x6, 0x40, 0x0, 0x0, 0x1000}, {0xb4, 0x4, 0xc2, 0x0, 0x0, 0x904}]}) ioctl$TCSETXF(r2, 0x5434, 0x0) 23:56:20 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x1ff, 0x2403) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000280)) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x4, @mcast2, 0x200e}, {0xa, 0x4e22, 0x1, @mcast1, 0x8}, r6, 0x1}}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000a00ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:20 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c4406"], 0x5) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 610.155447] device hsr_slave_1 left promiscuous mode 23:56:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000e00ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 610.190896] device hsr_slave_0 left promiscuous mode 23:56:20 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000017000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000018000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x23, 0x700, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 610.270905] team0 (unregistering): Port device team_slave_1 removed 23:56:20 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 610.323768] protocol 88fb is buggy, dev hsr_slave_0 [ 610.328915] protocol 88fb is buggy, dev hsr_slave_1 23:56:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000f00ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 610.379553] team0 (unregistering): Port device team_slave_0 removed [ 610.413396] audit: type=1804 audit(1573602980.949:83): pid=12513 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir039569219/syzkaller.sNbmmV/29/bus" dev="sda1" ino=16785 res=1 23:56:21 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 610.481846] bond0 (unregistering): Releasing backup interface bond_slave_1 23:56:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809006000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 610.541910] bond0 (unregistering): Releasing backup interface bond_slave_0 23:56:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900df00ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:21 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(0x0, r1, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 610.818375] bond0 (unregistering): Released all slaves 23:56:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900f000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 610.944340] audit: type=1804 audit(1573602981.479:84): pid=12511 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir039569219/syzkaller.sNbmmV/29/bus" dev="sda1" ino=16785 res=1 [ 612.642557] IPVS: ftp: loaded support on port[0] = 21 [ 612.716115] chnl_net:caif_netlink_parms(): no params data found [ 612.751351] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.757878] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.765313] device bridge_slave_0 entered promiscuous mode [ 612.772518] bridge0: port 2(bridge_slave_1) entered blocking state [ 612.779018] bridge0: port 2(bridge_slave_1) entered disabled state [ 612.786121] device bridge_slave_1 entered promiscuous mode [ 612.806911] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 612.815964] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 612.835310] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 612.842648] team0: Port device team_slave_0 added [ 612.848247] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 612.855909] team0: Port device team_slave_1 added [ 612.861825] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 612.869317] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 612.966680] device hsr_slave_0 entered promiscuous mode [ 613.014138] device hsr_slave_1 entered promiscuous mode [ 613.054324] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 613.061320] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 613.080053] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.086582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 613.093162] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.099584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 613.136679] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 613.142870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 613.151580] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 613.161917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 613.169280] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.176711] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.184370] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 613.194820] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 613.201101] 8021q: adding VLAN 0 to HW filter on device team0 [ 613.211970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 613.219760] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.226222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 613.236811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 613.245084] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.251440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 613.271530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 613.283262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 613.291711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 613.306251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 613.314328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 613.328554] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 613.334741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 613.349191] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 613.356832] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 613.363530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 613.376578] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 613.565569] protocol 88fb is buggy, dev hsr_slave_0 [ 613.570685] protocol 88fb is buggy, dev hsr_slave_1 23:56:24 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b0500"], 0x8) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000000)=0x62e32daf, 0x4) r2 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000000c0)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r3, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$nfc_llcp(r3, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900000aff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:24 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(0x0, r1, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900000eff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 613.684112] protocol 88fb is buggy, dev hsr_slave_0 [ 613.689227] protocol 88fb is buggy, dev hsr_slave_1 [ 613.693493] selinux_nlmsg_perm: 65 callbacks suppressed [ 613.693507] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 [ 613.740922] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 [ 613.757943] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 [ 613.773254] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 23:56:24 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20042, 0x40) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f00000001c0)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r1, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 613.797525] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 23:56:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900000fff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 613.894586] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 [ 613.983588] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 [ 614.029272] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 [ 614.048747] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 23:56:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000060ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 614.087310] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12553 comm=syz-executor.4 [ 614.163732] net_ratelimit: 6 callbacks suppressed [ 614.163740] protocol 88fb is buggy, dev hsr_slave_0 [ 614.173755] protocol 88fb is buggy, dev hsr_slave_1 [ 614.174020] protocol 88fb is buggy, dev hsr_slave_0 [ 614.183906] protocol 88fb is buggy, dev hsr_slave_1 23:56:24 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b0500"], 0x8) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:24 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="73110000000006000010"], 0xff86) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$netlink(0x10, 0x3, 0x4) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 23:56:24 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x80, 0xf4, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0xff97) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000280)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = gettid() tkill(r4, 0x1000000000013) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='clear_refs\x00') getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$nfc_llcp(r6, 0x118, 0x1, &(0x7f00000001c0)=""/165, 0xa5) 23:56:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe8090000dfff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe8090000f0ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:25 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(0x0, r1, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000002ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:25 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b0500"], 0x8) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:25 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) read(r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) move_pages(r0, 0x9, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil], &(0x7f0000000080)=[0x80000000, 0xe3], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) r3 = memfd_create(&(0x7f0000019580)='\x00\x951l\xe04\x80\xcd\x11m\xb0\x9b\xa6K\xab\xfd\xdc\xbcp\xa6-\xc6{\xc0\xdf=\xf2\xeeG\xceE\x01*A\x97K\x9b\x8ezdc%\xa1^i\xfa\x17`\xd2\xd1z\xb2\xc9\xf5\xe0\xe6\x05\xfb\xcc\xef\b\xd7Z*\xa2\x7f\xd8HT\xeeOO\x90\xa6\xd5(dH\xa2\xd6R\'\x81\x91u%\xde\x99\x86g\xa4lg\x1a\xff$(\x12Jh\xcd\xb9\xc7\xebd\rkq\x82\xbe\x1b\x9e\xe8\x9eoc\xfc\xb1\x85\xc0\x8d.}x\xed<\x97\fY\xc33\x86LK\xc0\x18\xc2\xe3]\x8a\xc0\x89A\xc8\xa4\xbch\x93\x01\xdb\x8eM5\xf1`\a\x13{\xca\x8c\x9dA\xb0\xa99\xdbP\x04u\x9c\xaa\x0e.M\xdd\xfc\x8a\x82\x88\x13\xaf\xb68\xbd\xae68\xad\xb4\xfd\x03T\xbfCl', 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) tkill(r0, 0x1000000000013) [ 614.579352] device bridge_slave_1 left promiscuous mode [ 614.601510] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000004ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 614.670043] device bridge_slave_0 left promiscuous mode [ 614.678139] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.888655] device hsr_slave_1 left promiscuous mode [ 614.947841] device hsr_slave_0 left promiscuous mode [ 614.989284] team0 (unregistering): Port device team_slave_1 removed [ 615.004543] team0 (unregistering): Port device team_slave_0 removed [ 615.021413] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 615.068757] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 615.209134] bond0 (unregistering): Released all slaves [ 616.327730] IPVS: ftp: loaded support on port[0] = 21 [ 616.448976] chnl_net:caif_netlink_parms(): no params data found [ 616.511036] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.521167] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.531397] device bridge_slave_0 entered promiscuous mode [ 616.542318] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.551637] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.562784] device bridge_slave_1 entered promiscuous mode [ 616.588073] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 616.601125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 616.619306] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 616.644325] team0: Port device team_slave_0 added [ 616.650708] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 616.658483] team0: Port device team_slave_1 added [ 616.664079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 616.671506] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 616.755933] device hsr_slave_0 entered promiscuous mode [ 616.784239] device hsr_slave_1 entered promiscuous mode [ 616.824461] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 616.831458] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 616.849951] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.856490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 616.863264] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.870001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.929305] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 616.936327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 616.946997] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 616.958141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 616.966778] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.973585] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.980975] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 616.992121] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 616.998583] 8021q: adding VLAN 0 to HW filter on device team0 [ 617.009047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 617.017451] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.023961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 617.034231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 617.041972] bridge0: port 2(bridge_slave_1) entered blocking state [ 617.048383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 617.065401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 617.073028] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 617.084796] Left network mode [ 617.093531] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 617.104822] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 617.115437] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 617.122457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 617.130756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 617.138547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 617.147286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 617.161069] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 617.183874] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 617.190621] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 617.202428] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 617.353797] protocol 88fb is buggy, dev hsr_slave_0 [ 617.358917] protocol 88fb is buggy, dev hsr_slave_1 [ 617.433951] IPVS: ftp: loaded support on port[0] = 21 [ 617.456175] protocol 88fb is buggy, dev hsr_slave_0 [ 617.461638] protocol 88fb is buggy, dev hsr_slave_1 [ 617.473785] protocol 88fb is buggy, dev hsr_slave_0 [ 617.478909] protocol 88fb is buggy, dev hsr_slave_1 23:56:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900000aff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:28 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:28 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b050073"], 0x9) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:28 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x3, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b", 0x1}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f0000000000)={0xffff, &(0x7f00000001c0)="faccd3d4f43f2ecd1a60e313d1f29bd85811dde5c16b75cedd770151a2b6067195bdc7d9740b91fd830ef6544fb2652996d7d15e085721b26917293bf25a837b1d"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900000eff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 617.620255] device bridge_slave_1 left promiscuous mode [ 617.626256] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:28 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 617.674755] device bridge_slave_0 left promiscuous mode [ 617.681507] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe80900000fff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 617.936020] device hsr_slave_1 left promiscuous mode [ 617.988559] device hsr_slave_0 left promiscuous mode [ 618.048274] team0 (unregistering): Port device team_slave_1 removed [ 618.059515] team0 (unregistering): Port device team_slave_0 removed [ 618.070009] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 618.118680] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 618.220158] bond0 (unregistering): Released all slaves [ 618.308641] chnl_net:caif_netlink_parms(): no params data found [ 618.404478] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.411021] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.434916] device bridge_slave_0 entered promiscuous mode [ 618.493880] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.500470] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.515527] device bridge_slave_1 entered promiscuous mode [ 618.559639] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 618.582033] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 618.630003] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 618.638223] team0: Port device team_slave_0 added [ 618.645842] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 618.654083] team0: Port device team_slave_1 added [ 618.659859] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 618.667533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 618.737376] device hsr_slave_0 entered promiscuous mode [ 618.774009] device hsr_slave_1 entered promiscuous mode [ 618.814398] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 618.821394] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 618.869941] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 618.979409] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 618.988998] 8021q: adding VLAN 0 to HW filter on device bond0 [ 619.010274] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 619.030140] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 619.041377] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 619.063268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 619.080951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 619.095340] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 619.101446] 8021q: adding VLAN 0 to HW filter on device team0 [ 619.135082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 619.142610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 619.150974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 619.158732] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.165121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 619.174839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 619.189567] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 619.199026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 619.206728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 619.215138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 619.222798] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.229197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 619.237177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 619.258313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 619.282747] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 619.300687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 619.311532] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 619.324703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 619.336925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 619.356760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 619.368171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 619.382456] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 619.394526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 619.419482] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 619.432030] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 619.442883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 619.465186] 8021q: adding VLAN 0 to HW filter on device batadv0 23:56:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000060ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:30 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:30 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b050073"], 0x9) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:30 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) write$P9_RMKDIR(r3, &(0x7f00000000c0)={0x14, 0x49, 0x1}, 0x14) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f00000001c0)={0x1, 0x8, [0xfff, 0x4, 0x7ff, 0x3, 0x7ff], 0x7}) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:30 executing program 3: mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) fstat(0xffffffffffffffff, 0x0) unshare(0x40000000) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='F\x15\x01\x00\x89\x05\x8b\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000140)={0x1, {&(0x7f0000000040)=""/228, 0xe4, &(0x7f0000000240)=""/210, 0x1, 0x1}}, 0x68) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 23:56:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 620.384593] device bridge_slave_1 left promiscuous mode [ 620.390223] bridge0: port 2(bridge_slave_1) entered disabled state [ 620.445760] device bridge_slave_0 left promiscuous mode [ 620.466205] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.485835] selinux_nlmsg_perm: 50 callbacks suppressed [ 620.485850] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 [ 620.533358] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 23:56:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe8090000dfff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 620.541914] IPVS: ftp: loaded support on port[0] = 21 23:56:31 executing program 1: rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r0 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r0, r1, 0x1000000000002) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 620.583018] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 [ 620.627584] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 23:56:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0200f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 620.708723] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 [ 620.723773] net_ratelimit: 2 callbacks suppressed [ 620.723781] protocol 88fb is buggy, dev hsr_slave_0 [ 620.733821] protocol 88fb is buggy, dev hsr_slave_1 [ 620.739350] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 23:56:31 executing program 1: rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r0 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r0, r1, 0x1000000000002) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 620.757602] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 [ 620.845454] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 [ 620.864106] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 23:56:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0400f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 620.906200] device hsr_slave_1 left promiscuous mode [ 620.942012] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12656 comm=syz-executor.4 [ 620.960660] device hsr_slave_0 left promiscuous mode 23:56:31 executing program 1: rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r0 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r0, r1, 0x1000000000002) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 621.028931] team0 (unregistering): Port device team_slave_1 removed 23:56:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0a00f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 621.102438] team0 (unregistering): Port device team_slave_0 removed [ 621.163746] bond0 (unregistering): Releasing backup interface bond_slave_1 23:56:31 executing program 1: r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 621.244277] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 621.300693] IPVS: ftp: loaded support on port[0] = 21 [ 621.522063] bond0 (unregistering): Released all slaves 23:56:32 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b050073"], 0x9) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0e00f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:32 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='bpf\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$isdn(r3, &(0x7f0000000080)={0x4477, 0x2, "3db62f2549ae8268"}, 0x10, 0x1, &(0x7f0000000100)={0x22, 0x7, 0x2, 0x40, 0x7}, 0x6) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c6507a2e6a32cda989c312c7570706572646972"]) [ 623.209366] IPVS: ftp: loaded support on port[0] = 21 [ 623.476483] chnl_net:caif_netlink_parms(): no params data found [ 623.543262] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.570259] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.581533] device bridge_slave_0 entered promiscuous mode [ 623.607034] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.615522] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.640934] device bridge_slave_1 entered promiscuous mode [ 623.673260] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 623.683523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 623.721015] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 623.728677] team0: Port device team_slave_0 added [ 623.738938] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 623.748315] team0: Port device team_slave_1 added [ 623.753770] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 623.762083] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 623.826618] device hsr_slave_0 entered promiscuous mode [ 623.867324] device hsr_slave_1 entered promiscuous mode [ 623.907299] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 623.922494] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 623.982090] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.988513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.995194] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.001562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 624.089881] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 624.104258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 624.131372] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 624.160761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 624.171323] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.188739] bridge0: port 2(bridge_slave_1) entered disabled state [ 624.196957] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 624.210713] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 624.217401] 8021q: adding VLAN 0 to HW filter on device team0 [ 624.238541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 624.250266] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.256686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 624.290593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 624.299621] bridge0: port 2(bridge_slave_1) entered blocking state [ 624.306044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 624.314814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 624.331106] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 624.341339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 624.360548] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 624.371121] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 624.383293] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 624.398789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 624.409969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 624.438118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 624.446973] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 624.457104] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 624.465225] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 624.471969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 624.483592] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 624.623746] protocol 88fb is buggy, dev hsr_slave_0 [ 624.628878] protocol 88fb is buggy, dev hsr_slave_1 [ 624.743786] protocol 88fb is buggy, dev hsr_slave_0 [ 624.748924] protocol 88fb is buggy, dev hsr_slave_1 23:56:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:35 executing program 1: r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0f00f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:35 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(0xffffffffffffffff) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:35 executing program 3: r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) ftruncate(r0, 0x800) lseek(r0, 0x4200, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x9c49) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x196) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RREMOVE(r4, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0x7) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) r6 = open(&(0x7f0000001ac0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="242f12cae78e8e484a0fab4ce2368c35db4d70bda6995fb6f33c26fcc09382b21306bddfa6aa74f0cbbe246ed9b2177577bbadd43ecceb0a4de6cf50a48ae99bb36d7486d7a24ed45f93a85781957a1644d0a05ea23c845311857edd2edbf8ab9b3d1b31493a8d0831a59113fec1"]) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r5}) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40000, 0x0) getdents64(r0, &(0x7f0000000340)=""/144, 0x90) write$P9_RCREATE(r7, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0xe8, 0x0, 0x1}, 0x2}}, 0x18) 23:56:35 executing program 1: r0 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 625.007365] audit: type=1804 audit(1573602995.549:85): pid=12720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir131046446/syzkaller.rRxZZg/3/bus" dev="sda1" ino=16727 res=1 23:56:35 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(0xffffffffffffffff) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff6000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 625.128109] audit: type=1804 audit(1573602995.569:86): pid=12720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir131046446/syzkaller.rRxZZg/3/bus" dev="sda1" ino=16727 res=1 23:56:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:35 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:35 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = gettid() r1 = open(&(0x7f0000000300)='./file0\x00', 0x14002, 0x100) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0xa, 0x80805, 0x0) close(r4) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xf, &(0x7f00000000c0)={r7, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000540)={r7, 0xe1, "91c0487c599a29658024c163a8fdc34cf2815e45744a3a2ed97cc876c2558c8b8362f0c9c445f56ef71e7d4eefcb18d3cfe5735864261e396365741f973ee5e75a3d39571932f2663d44f793bc1aee3b12cce9205ca684daf92c17ea54ebea01994d3184ab8051487f798439bf292ef77ad330467af2717f2ef98c2f2e8c369f67c9d7b06fb1dbc6e65a55185eb30be561739919b9e78b6bb77c69340dcfc5a257d896b27b1e4e9ebae57b6dcdbfd9388119723c55b20e0e1c9646264b6f6b3d8dfa5013c87eef1fd7d5d0157e183d5392102f2ec6951bbc43500c7375b1754182"}, &(0x7f0000000640)=0xe9) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000680)={r8, @in={{0x2, 0x4e22, @local}}}, 0x84) dup(0xffffffffffffffff) r9 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r9, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$SIOCAX25CTLCON(r10, 0x89e8, &(0x7f00000004c0)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x4, 0x3ff, 0x6, [@bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) close(r9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000040)=""/23) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) utime(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x7, 0x55}) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="7c000000d8286582342fbe643ba93b75d3803f267c458b9ba1a12ac0e6c4a8e6db3bc27979e23aaf1bb57a893979ec2d682f263ad9a59be0e9956387994f2ed8e82cdda1ca3e258ea9b674234205195a898c69971549828b0b5f04fb1dcd471b463d746fa89a51e48aa4b8ec01b2c5a769f76dc262f0d7c8685a847934fcab5a15de8ea56ef3fb70e0023efc0a77c355acd997ae6d09f3247e362005b8f23e8741ae709f42d72fde6d6e5b0a7c3c9cbb964e8643fb9ea420ac6165c31d838400ac0cfd08e76542c1d27a39fac60e7fce5cf4105bc50c4aa1c33fa5a569e3a0dacaf5984c1e2ab5b6ce00c8558d501fc1c3ad", @ANYRES16=r11, @ANYBLOB="00082cbd7000fedbdf250b00000030000500080001006962000008000100696200000c000200080004008000000008000100657468000800010065746800380002000800010000000100080002dd05000000080001000900000004000400080001000100000008000200020000000800020004000000"], 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0x8020) 23:56:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ffdf00f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:35 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(0xffffffffffffffff) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:36 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000fff000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:36 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:36 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 625.670663] selinux_nlmsg_perm: 20 callbacks suppressed [ 625.670679] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 23:56:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff000af03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 625.754485] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 [ 625.763745] protocol 88fb is buggy, dev hsr_slave_0 [ 625.771799] protocol 88fb is buggy, dev hsr_slave_1 23:56:36 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000), 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 625.814112] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 23:56:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff000ef03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 625.857402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 23:56:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff000ff03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 625.930935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 [ 625.994335] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 [ 626.003735] protocol 88fb is buggy, dev hsr_slave_0 [ 626.011544] protocol 88fb is buggy, dev hsr_slave_1 [ 626.034125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 [ 626.084881] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 [ 626.127008] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 [ 626.171842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12758 comm=syz-executor.4 [ 628.304790] device bridge_slave_1 left promiscuous mode [ 628.311336] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x1f}) write$cgroup_int(r0, &(0x7f0000000080), 0x87f1a7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) r3 = inotify_init() ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYRESDEC]) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) r4 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) 23:56:38 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000), 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0060f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 628.368147] device bridge_slave_0 left promiscuous mode [ 628.375877] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.627251] device hsr_slave_1 left promiscuous mode [ 628.668921] device hsr_slave_0 left promiscuous mode [ 628.711629] team0 (unregistering): Port device team_slave_1 removed [ 628.732061] team0 (unregistering): Port device team_slave_0 removed [ 628.752208] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 628.788913] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 628.868954] bond0 (unregistering): Released all slaves [ 628.933208] IPVS: ftp: loaded support on port[0] = 21 [ 629.095489] chnl_net:caif_netlink_parms(): no params data found [ 629.156017] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.162463] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.170276] device bridge_slave_0 entered promiscuous mode [ 629.177758] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.184633] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.191936] device bridge_slave_1 entered promiscuous mode [ 629.212267] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 629.222320] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 629.249333] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 629.263971] team0: Port device team_slave_0 added [ 629.269715] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 629.278708] team0: Port device team_slave_1 added [ 629.284404] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 629.291794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 629.366627] device hsr_slave_0 entered promiscuous mode [ 629.414084] device hsr_slave_1 entered promiscuous mode [ 629.454274] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 629.461341] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 629.499600] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.506027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.512660] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.519055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.616605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 629.634597] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 629.653309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.662445] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.680821] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.696652] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 629.702751] 8021q: adding VLAN 0 to HW filter on device team0 [ 629.723444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.740733] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.747170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.785563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.800820] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.807243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.840972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 629.851177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 629.867431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.885941] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 629.897919] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 629.904273] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 629.911753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 629.919801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.935238] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 629.944807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 629.951582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 629.965948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 630.123731] protocol 88fb is buggy, dev hsr_slave_0 [ 630.128864] protocol 88fb is buggy, dev hsr_slave_1 [ 630.163966] protocol 88fb is buggy, dev hsr_slave_0 [ 630.169151] protocol 88fb is buggy, dev hsr_slave_1 23:56:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:40 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:40 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6400) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x5, 0x21000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f00000003c0)={0x0, 0x40000, r6}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000400)={r7, 0x80000, r3}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$inet6_udplite(0xa, 0x2, 0x88) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r14, &(0x7f00000000c0)=[{{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@pktinfo={{0x24, 0x29, 0x32, {@dev, r16}}}], 0x28}}], 0x2, 0x0) setsockopt$packet_add_memb(r13, 0x107, 0x1, &(0x7f0000000480)={r16, 0x1, 0x6, @remote}, 0x10) r17 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r17, @ANYBLOB="2b04080000000000000000007e44d04574683a7361696630000000cd0000000000000000f7623cc215cda61a8d5e197aebf4d2f1d41212018b75b1057070aed8a8c98195f4b37e8d3a002bfae1d72508ab54973ea766fe5eb7927037dc469f5c912b6dfb8c804380a43a330b72a4b56fec4a3956af2544fe0b02e780f9c6e547db5ec51506bb18f354b79881c443b97947bbe9f44beb320ae6d536cdbc"], 0x34}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r10, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r17, 0x300, 0x3, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x1000, @link='syz0\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xbcb8832ca277a689}, 0x46d3f606819e3c65) r18 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) bind$isdn_base(r18, &(0x7f00000000c0)={0x22, 0x6, 0x80, 0x7, 0x7}, 0x6) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000000)=0x7) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff00dff03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:40 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000), 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000100)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0xffffffffffffffff}) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000000140)=@caif=@dgm, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/230, 0xe6}, {&(0x7f00000001c0)=""/45, 0x2d}, {&(0x7f0000000400)=""/196, 0xc4}, {&(0x7f0000000500)=""/64, 0x40}], 0x4}, 0x4d38b38c3d61862b) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:56:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff00f0f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 630.353764] protocol 88fb is buggy, dev hsr_slave_0 [ 630.358885] protocol 88fb is buggy, dev hsr_slave_1 23:56:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f00000001c0)={r4, 0x1}) r5 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:41 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 630.408092] *** Guest State *** [ 630.411428] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 630.444104] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 23:56:41 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 630.497317] CR3 = 0x0000000000000000 [ 630.513973] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 630.521091] RFLAGS=0xffffffffffffffff DR7 = 0x0000000000000400 23:56:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0002f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 630.592560] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 630.615292] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 23:56:41 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 630.676961] selinux_nlmsg_perm: 23 callbacks suppressed [ 630.676976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 630.680968] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 23:56:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0004f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 630.729730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 630.741542] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 23:56:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 630.803739] protocol 88fb is buggy, dev hsr_slave_0 [ 630.803908] protocol 88fb is buggy, dev hsr_slave_0 [ 630.808824] protocol 88fb is buggy, dev hsr_slave_1 [ 630.813855] protocol 88fb is buggy, dev hsr_slave_1 [ 630.836223] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 630.839855] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 630.931905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 630.944278] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 630.974632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 630.994012] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 23:56:41 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 631.020906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 631.047417] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 631.104063] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 631.106260] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 631.124405] protocol 88fb is buggy, dev hsr_slave_0 [ 631.124472] protocol 88fb is buggy, dev hsr_slave_1 [ 631.166458] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 631.179451] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 631.206066] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 631.232953] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 631.244120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12825 comm=syz-executor.4 [ 631.291664] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 631.307834] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 631.323864] Interruptibility = 00000000 ActivityState = 00000000 [ 631.330461] *** Host State *** [ 631.343106] RIP = 0xffffffff811c9793 RSP = 0xffff8880570378c0 [ 631.352978] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 631.360320] FSBase=00007fbe442f5700 GSBase=ffff8880ae900000 TRBase=fffffe0000003000 [ 631.368873] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 631.390755] CR0=0000000080050033 CR3=00000000440a1000 CR4=00000000001426e0 [ 631.403938] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87001400 [ 631.410786] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 631.434073] *** Control State *** [ 631.437645] PinBased=0000003f CPUBased=b5a06dfe SecondaryExec=000000e3 [ 631.454712] EntryControls=0000d1ff ExitControls=002fefff [ 631.460279] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 631.473931] VMEntry: intr_info=80000000 errcode=00000000 ilen=00000000 [ 631.480842] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 631.487695] reason=80000021 qualification=0000000000000000 [ 631.494458] IDTVectoring: info=00000000 errcode=00000000 [ 631.500150] TSC Offset = 0xfffffeac885f2b96 [ 631.511574] TPR Threshold = 0x00 [ 631.516062] EPT pointer = 0x000000008a76001e [ 631.520655] Virtual processor ID = 0x0001 23:56:42 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x10, 0x1d, 0x10, "9a39c0923194bf22cfd5566f04d82a8e4eba67c7f8329b8b53884f642f3b420d40f5bc811010e9211825ff24b24bdd14309b74d2c13106af45c93c911c826166", "2184af95c86a75d3c738c00781196c43eb9717b9f54fa5c04db5f4e14e26e34ba9fd64e58a9bd83b2ce5106d82770c95bcddaefb2dfeeefcffed870206a7c779", "42baef5bd800beed1a95ff0baf4894c05c0f59bef9d6ecc372abe4493f7851ce", [0x2, 0x6]}) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:42 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:42 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff000af03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 631.618626] device bridge_slave_1 left promiscuous mode [ 631.625449] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:42 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 631.720726] device bridge_slave_0 left promiscuous mode [ 631.726758] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff000ef03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff000ff03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:42 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 631.970415] device hsr_slave_1 left promiscuous mode [ 632.003739] protocol 88fb is buggy, dev hsr_slave_0 [ 632.008963] protocol 88fb is buggy, dev hsr_slave_1 23:56:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0060f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 632.046423] device hsr_slave_0 left promiscuous mode [ 632.089479] team0 (unregistering): Port device team_slave_1 removed 23:56:42 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 632.182469] team0 (unregistering): Port device team_slave_0 removed [ 632.227177] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 632.244327] protocol 88fb is buggy, dev hsr_slave_0 [ 632.249471] protocol 88fb is buggy, dev hsr_slave_1 [ 632.289212] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 632.519446] bond0 (unregistering): Released all slaves [ 633.942218] IPVS: ftp: loaded support on port[0] = 21 [ 634.011898] chnl_net:caif_netlink_parms(): no params data found [ 634.046563] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.052990] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.060417] device bridge_slave_0 entered promiscuous mode [ 634.067522] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.074024] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.081138] device bridge_slave_1 entered promiscuous mode [ 634.097892] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 634.107188] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 634.125913] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 634.133174] team0: Port device team_slave_0 added [ 634.138934] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 634.146286] team0: Port device team_slave_1 added [ 634.151494] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 634.158966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 634.226148] device hsr_slave_0 entered promiscuous mode [ 634.274090] device hsr_slave_1 entered promiscuous mode [ 634.315219] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 634.322398] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 634.337940] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.344399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 634.350984] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.357398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 634.395188] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 634.401290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 634.411107] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 634.421082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 634.428363] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.435420] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.442570] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 634.454933] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 634.461069] 8021q: adding VLAN 0 to HW filter on device team0 [ 634.475815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 634.483434] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.489841] bridge0: port 1(bridge_slave_0) entered forwarding state [ 634.497108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 634.505206] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.511561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 634.527934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 634.535727] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 634.547674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 634.561199] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 634.572328] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 634.582771] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 634.589619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 634.597541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 634.606180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 634.623062] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 634.631010] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 634.637984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 634.650910] 8021q: adding VLAN 0 to HW filter on device batadv0 23:56:45 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff00dff03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:45 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1002000000013) r1 = getegid() setgroups(0x1, &(0x7f0000000200)=[r1]) r2 = getegid() setgroups(0x1, &(0x7f0000000200)=[r2]) r3 = getegid() setgroups(0x1, &(0x7f0000000200)=[r3]) r4 = getegid() setgroups(0x1, &(0x7f0000000200)=[r4]) getgroups(0x7, &(0x7f0000000000)=[r1, r2, 0x0, 0xee00, 0x0, r3, r4]) r6 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r8 = getegid() setgroups(0x1, &(0x7f0000000200)=[r8]) r9 = getegid() setgroups(0x1, &(0x7f0000000200)=[r9]) getgroups(0x6, &(0x7f0000000200)=[r5, r6, r7, 0xee00, r8, r9]) 23:56:45 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:45 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a5582b9a6fdfebbf3550b22098901348f8fc6716e08d1363ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde71c8b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='u\xfd\x8cnts\x00\x00\x00\x00\x00\x00\x00\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000040)=0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) r8 = getpid() r9 = getpid() rt_tgsigqueueinfo(r9, r8, 0x16, &(0x7f0000000100)) ptrace(0x10, r8) fcntl$lock(0xffffffffffffffff, 0x3f, &(0x7f0000000200)={0x2, 0xb27ee9c32016b6eb, 0x9c3, 0x3, r8}) r10 = open(&(0x7f0000000000)='\x00', 0x4000, 0x6) ioctl$EVIOCGPROP(r10, 0x80404509, &(0x7f0000000180)=""/123) r11 = socket$isdn(0x22, 0x3, 0x9da0240b2134b11f) ioctl$sock_FIOGETOWN(r11, 0x8903, &(0x7f0000000000)=0x0) wait4(r12, 0x0, 0x40000000, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r13, 0x408) r14 = dup(0xffffffffffffffff) r15 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r15, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3}, 0x6}, 0x1c) getsockopt$sock_buf(r15, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) ioctl$sock_FIOGETOWN(r15, 0x8903, &(0x7f0000000000)=0x0) wait4(r16, 0x0, 0x40000000, 0x0) r17 = getpgid(r16) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r19 = getpid() sched_setattr(r19, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r20 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r21 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r22 = fcntl$dupfd(r20, 0x0, r21) r23 = gettid() ioctl$BLKTRACESETUP(r22, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x40, 0x81, 0x1, r23}) r24 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r25 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r26 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r27 = fcntl$dupfd(r25, 0x0, r26) r28 = gettid() ioctl$BLKTRACESETUP(r27, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x40, 0x81, 0x1, r28}) r29 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r30 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r30, 0x0, 0x0) r31 = getpgrp(0x0) waitid(0x0, r31, &(0x7f00000002c0), 0x5, 0x0) r32 = getpgid(r31) r33 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r33, 0x8904, &(0x7f0000000000)=0x0) r35 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r36 = openat$cgroup_ro(r35, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r37 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r38 = inotify_init1(0x0) r39 = gettid() fcntl$setown(r38, 0x8, r39) r40 = getpid() r41 = socket(0xa, 0x3, 0x8) r42 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r41, 0x8923, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r42, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r41, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r44 = gettid() waitid(0x83b895581628fca4, r44, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r41, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r43, @ANYRESDEC=r44]], 0xfffffffffffffe56}}, 0x20004850) r45 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r46 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r47 = dup2(r46, r45) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r14, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x4, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00u#c1y\x8a\xc6^\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r47, 0xc08c5334, &(0x7f0000000200)) r48 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r48) timer_create(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, @tid=r48}, 0x0) kcmp(r48, r48, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r48, 0x0, 0x0) r49 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r48, r49, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r44, r47, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r50}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r50}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r50}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r40, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r50}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r50}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r39, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='ppp0eth1]*em0\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r37, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r36, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r34, r33, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r32, r30, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r50}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r50}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r28, r29, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r23, r24, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r19, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000040)='GPLvmnet0\\]GPL&systemeth1\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r18, 0xffffffffffffffff, 0x0, 0x9, &(0x7f00000000c0)='*\x00\x00\x00/Ppp\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r17, r14, 0x0, 0x3, &(0x7f0000000100)=',)\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={r12, r13, 0x0, 0xffffffffffffffcc, &(0x7f0000000680)='\x00', r50}, 0x394) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r10, 0x0, 0x9, &(0x7f0000000440)='/dev/kvm\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r50}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x0, 0x14, &(0x7f0000000000)='\'\x0e:posix_acl_access\x00', r50}, 0x30) r52 = socket$inet6_tcp(0xa, 0x1, 0x0) r53 = fcntl$dupfd(r52, 0x0, r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) r54 = socket$inet6_tcp(0xa, 0x1, 0x0) r55 = fcntl$dupfd(r54, 0x0, r54) ioctl$PERF_EVENT_IOC_ENABLE(r55, 0x8912, 0x400200) ioctl$FIDEDUPERANGE(r51, 0xc0189436, &(0x7f00000001c0)={0xf8da, 0x5, 0x4, 0x0, 0x0, [{r53}, {r55, 0x0, 0xac}, {r2, 0x0, 0x1000}, {0xffffffffffffffff, 0x0, 0x7}]}) 23:56:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7020003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:45 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 634.997034] libceph: connect [d::]:6789 error -101 [ 635.002364] libceph: mon0 [d::]:6789 connect error 23:56:45 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 635.083056] libceph: connect [d::]:6789 error -101 [ 635.088709] libceph: mon0 [d::]:6789 connect error 23:56:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac70a0003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:45 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:45 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac70b0003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 635.386890] libceph: connect [d::]:6789 error -101 [ 635.392307] libceph: mon0 [d::]:6789 connect error 23:56:46 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1002000000013) r1 = getegid() setgroups(0x1, &(0x7f0000000200)=[r1]) r2 = getegid() setgroups(0x1, &(0x7f0000000200)=[r2]) r3 = getegid() setgroups(0x1, &(0x7f0000000200)=[r3]) r4 = getegid() setgroups(0x1, &(0x7f0000000200)=[r4]) getgroups(0x7, &(0x7f0000000000)=[r1, r2, 0x0, 0xee00, 0x0, r3, r4]) r6 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r8 = getegid() setgroups(0x1, &(0x7f0000000200)=[r8]) r9 = getegid() setgroups(0x1, &(0x7f0000000200)=[r9]) getgroups(0x6, &(0x7f0000000200)=[r5, r6, r7, 0xee00, r8, r9]) 23:56:46 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000000c0)={'veth1_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}}) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000001c0)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:46 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:46 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710a800ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 635.799436] libceph: connect [d::]:6789 error -101 [ 635.805699] libceph: mon0 [d::]:6789 connect error [ 635.834889] device bridge_slave_1 left promiscuous mode [ 635.840965] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:46 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 635.914853] device bridge_slave_0 left promiscuous mode [ 635.916465] selinux_nlmsg_perm: 62 callbacks suppressed [ 635.916479] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 635.922705] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d000ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 635.989263] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 636.074215] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 636.109628] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 23:56:46 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, 0x0, 0x0) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 636.164237] net_ratelimit: 2 callbacks suppressed [ 636.164294] protocol 88fb is buggy, dev hsr_slave_0 [ 636.174844] protocol 88fb is buggy, dev hsr_slave_1 23:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100203ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 636.207645] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 636.301039] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 636.346841] device hsr_slave_1 left promiscuous mode 23:56:46 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, 0x0, 0x0) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 636.372878] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 636.394319] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 636.406801] protocol 88fb is buggy, dev hsr_slave_0 [ 636.406861] protocol 88fb is buggy, dev hsr_slave_1 23:56:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100403ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 636.438821] device hsr_slave_0 left promiscuous mode [ 636.474182] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 636.508678] team0 (unregistering): Port device team_slave_1 removed [ 636.536328] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=12955 comm=syz-executor.4 [ 636.569517] team0 (unregistering): Port device team_slave_0 removed [ 636.620172] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 636.698120] bond0 (unregistering): Releasing backup interface bond_slave_0 23:56:47 executing program 3: ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x8084) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000080)={0x802b, 0x3}) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e5c"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$setown(r2, 0x8, r4) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='\x01\x00', 0x40001, &(0x7f00000005c0)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x6000, 0xffffffffffffffff) [ 636.958080] bond0 (unregistering): Released all slaves 23:56:47 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, 0x0, 0x0) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100a03ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:47 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:47 executing program 3: ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x8084) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000080)={0x802b, 0x3}) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e5c"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$setown(r2, 0x8, r4) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='\x01\x00', 0x40001, &(0x7f00000005c0)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x6000, 0xffffffffffffffff) [ 638.656498] IPVS: ftp: loaded support on port[0] = 21 [ 638.722809] chnl_net:caif_netlink_parms(): no params data found [ 638.757102] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.763804] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.770890] device bridge_slave_0 entered promiscuous mode [ 638.778661] bridge0: port 2(bridge_slave_1) entered blocking state [ 638.785485] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.792860] device bridge_slave_1 entered promiscuous mode [ 638.812742] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 638.821942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 638.839588] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 638.847183] team0: Port device team_slave_0 added [ 638.852789] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 638.860591] team0: Port device team_slave_1 added [ 638.866094] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 638.873397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 638.935884] device hsr_slave_0 entered promiscuous mode [ 638.984102] device hsr_slave_1 entered promiscuous mode [ 639.024308] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 639.031260] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 639.045857] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.052245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 639.058949] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.065332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 639.100294] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 639.106674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 639.115511] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 639.126256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 639.133745] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.140399] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.147577] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 639.157559] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 639.163632] 8021q: adding VLAN 0 to HW filter on device team0 [ 639.173503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 639.182218] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.188679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 639.199056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 639.207233] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.213593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 639.235645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 639.243412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 639.251938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 639.262779] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 639.274122] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 639.280206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 639.288221] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 639.295495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 639.310994] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 639.318994] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 639.326561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 639.341175] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 639.444467] protocol 88fb is buggy, dev hsr_slave_0 [ 639.450005] protocol 88fb is buggy, dev hsr_slave_1 [ 639.505233] protocol 88fb is buggy, dev hsr_slave_0 [ 639.510908] protocol 88fb is buggy, dev hsr_slave_1 23:56:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(0x0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100e03ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$nfc_llcp(r1, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cd6e4cafe0569942f46cde7188b"}, 0x60) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x800, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_SELECTION(r4, 0xc040565f, &(0x7f00000001c0)={0x6, 0x4, 0x0, {0x4eec, 0x6, 0x410f, 0x1}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000000580)={0x7, 0x0, [{0x2000, 0x15, &(0x7f0000000200)=""/21}, {0x1, 0x0, &(0x7f0000000280)}, {0xa803, 0xce, &(0x7f00000002c0)=""/206}, {0x5eb05afc363cad4, 0x5f, &(0x7f00000003c0)=""/95}, {0x10b004, 0x5a, &(0x7f0000000440)=""/90}, {0x2000, 0x70, &(0x7f00000004c0)=""/112}, {0x0, 0x0, &(0x7f0000000540)}]}) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="06000f779c57cef6776ed9eb00000f07900eaa491b803665b09000602447ff01000032e6fc222281c0bca5"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400000, 0x0) 23:56:50 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040), 0x0) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) io_setup(0x4, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = dup2(r2, r0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x80, 0x2, 0x9, 0x3, 0x0, 0x6, 0x2040, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffbd, 0x2, @perf_bp={&(0x7f0000000080), 0x4e5d02abc490dcad}, 0x15a00, 0xffffffff80000000, 0x7fffffff, 0x1, 0xd3}, r3, 0x9, r5, 0xd) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r6 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@empty, @in=@empty}}, {{}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac41f1de628e2a3166", 0xd1, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000ac0)=""/245, 0x100000394) r7 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x80, 0x110001) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r7, 0x800442d2, &(0x7f00000003c0)={0x7, &(0x7f00000004c0)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @local}]}) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 23:56:50 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100f03ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 639.733766] protocol 88fb is buggy, dev hsr_slave_0 [ 639.738917] protocol 88fb is buggy, dev hsr_slave_1 23:56:50 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040), 0x0) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:50 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(0x0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:50 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r7 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = fcntl$dupfd(r10, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bind$inet(r11, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r7, 0x84, 0x4, &(0x7f0000000000)=0x6, 0x4) r12 = creat(&(0x7f00000001c0)='./file0\x00', 0x8) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r14, 0x0, 0x63, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) ioctl$TCGETS(r12, 0x5401, &(0x7f0000000200)) getsockopt$nfc_llcp(r0, 0x118, 0x3, &(0x7f0000000100)=""/149, 0xffffff03) 23:56:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7106003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:50 executing program 3: write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000200)=0x81, 0x33) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0xffffffffffffff7a, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8040fffffffd) 23:56:50 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040), 0x0) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:50 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(0x0, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710df03ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 640.087522] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:56:50 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f00000001c0)) 23:56:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100005ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:50 executing program 3: 23:56:50 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:50 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:51 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x7cedd88c2eabbda0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0xfffffffd, 0x4, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x500000, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x91fbbbaa2fc6a79d, &(0x7f0000000000)=0x3, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc4c85513, &(0x7f00000001c0)={{0x2, 0x5, 0x6, 0x7, '\x00', 0xffffffff}, 0x0, [0x1ff, 0x5, 0x5, 0x4, 0xb13d, 0x5, 0x3e61, 0x0, 0x1, 0x4, 0x80, 0x7, 0xfffffffffffffffc, 0x200, 0xdc1, 0x1, 0xffffffffffffff34, 0x8, 0x5, 0x0, 0x3, 0x100, 0x4, 0x9, 0x1, 0xa7, 0x3, 0xc5, 0x7, 0x1, 0x3, 0x1000, 0x7, 0x7db85a99, 0x9, 0x20, 0xfd1, 0x8000, 0x81, 0x7fff, 0x1, 0x9f, 0x2, 0x101, 0x0, 0x101, 0x4834, 0x6, 0x2, 0xffff, 0x3, 0x8, 0xfff, 0xc6f, 0x41f1, 0x7, 0x0, 0x5, 0xdc8, 0x8, 0x4, 0xb442, 0x8, 0xffff, 0x0, 0x80000000, 0x5000000000, 0xa2f8, 0x0, 0x7, 0x6d43de6e, 0x1, 0x9, 0x3, 0xfffffffffffffff8, 0x2, 0x80000000, 0x8, 0x400, 0x1f, 0x8, 0x101, 0x1ff, 0x3ff, 0x2, 0x100000000, 0x0, 0xb8, 0x5, 0x81, 0x6, 0x1ff, 0x8, 0x80000000, 0x8001, 0xfff, 0x8001, 0x35, 0x4, 0x7ff, 0x0, 0x1bec, 0x2, 0x0, 0x963, 0x100, 0x2, 0x66f6535b, 0x5, 0x4, 0x71, 0x7, 0x9, 0x8, 0x4, 0x1, 0xffffffff, 0xbdb, 0xfffffffffffffeff, 0x7, 0xfffffffffffffffb, 0x1, 0x1, 0x5, 0x3, 0xd33c, 0x7, 0x1], {0x77359400}}) socket$inet6_udplite(0xa, 0x2, 0x88) 23:56:51 executing program 3: 23:56:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100002ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 640.514710] device bridge_slave_1 left promiscuous mode [ 640.520247] bridge0: port 2(bridge_slave_1) entered disabled state 23:56:51 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 640.594758] device bridge_slave_0 left promiscuous mode [ 640.604489] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:51 executing program 3: [ 640.886560] device hsr_slave_1 left promiscuous mode [ 640.938819] device hsr_slave_0 left promiscuous mode [ 640.988445] team0 (unregistering): Port device team_slave_1 removed [ 641.021906] team0 (unregistering): Port device team_slave_0 removed [ 641.061242] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 641.119086] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 641.203739] net_ratelimit: 6 callbacks suppressed [ 641.203746] protocol 88fb is buggy, dev hsr_slave_0 [ 641.203840] protocol 88fb is buggy, dev hsr_slave_0 [ 641.208683] protocol 88fb is buggy, dev hsr_slave_1 [ 641.213736] protocol 88fb is buggy, dev hsr_slave_1 [ 641.312305] bond0 (unregistering): Released all slaves [ 642.612255] IPVS: ftp: loaded support on port[0] = 21 [ 642.690972] chnl_net:caif_netlink_parms(): no params data found [ 642.726847] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.733311] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.740605] device bridge_slave_0 entered promiscuous mode [ 642.747759] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.754241] bridge0: port 2(bridge_slave_1) entered disabled state [ 642.761593] device bridge_slave_1 entered promiscuous mode [ 642.778801] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 642.787925] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 642.804310] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 642.811796] team0: Port device team_slave_0 added [ 642.817412] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 642.824765] team0: Port device team_slave_1 added [ 642.830816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 642.838281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 642.896620] device hsr_slave_0 entered promiscuous mode [ 642.974102] device hsr_slave_1 entered promiscuous mode [ 643.014275] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 643.021221] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 643.035729] bridge0: port 2(bridge_slave_1) entered blocking state [ 643.042101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 643.048788] bridge0: port 1(bridge_slave_0) entered blocking state [ 643.055188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 643.090223] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 643.096532] 8021q: adding VLAN 0 to HW filter on device bond0 [ 643.106113] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 643.115198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 643.122596] bridge0: port 1(bridge_slave_0) entered disabled state [ 643.129976] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.137445] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 643.148790] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 643.155203] 8021q: adding VLAN 0 to HW filter on device team0 [ 643.164890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 643.172422] bridge0: port 1(bridge_slave_0) entered blocking state [ 643.178814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 643.189398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 643.200432] bridge0: port 2(bridge_slave_1) entered blocking state [ 643.206873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 643.225796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 643.233588] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 643.248186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 643.260504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 643.272370] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 643.283219] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 643.289624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 643.297444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 643.311152] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 643.319332] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 643.326606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 643.339420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 643.403796] protocol 88fb is buggy, dev hsr_slave_0 [ 643.408911] protocol 88fb is buggy, dev hsr_slave_1 23:56:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100005ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:54 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{0x0}], 0x1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:54 executing program 3: 23:56:54 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:54 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) io_setup(0x1, &(0x7f00000001c0)=0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001200)='net/ip_vs_stats\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000022c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) pipe2(&(0x7f0000003680)={0xffffffffffffffff}, 0x800) r17 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000003740)='/dev/sequencer\x00', 0x400002, 0x0) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = fcntl$dupfd(r18, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) io_submit(r3, 0x8, &(0x7f0000003880)=[&(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x3, r2, &(0x7f0000000200)="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", 0x1000, 0x7, 0x0, 0x0, r4}, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x5, 0x100, r1, &(0x7f0000001280)="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", 0x1000, 0x4, 0x0, 0x1, r6}, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x2, r7, &(0x7f0000002300)="2db14ff929f2fd10b2c1887109d73a3545890f751d127bf97bb618f3b140800882a12f8f9e7c6ff2d2d8a77ff0b0cdd2b1e4bdedc5ced1a76b7e6eaf3ec090954716470a4ce02d77f23ea4b6991b3ce3a0f225b4d95b27f8290ced82d2ea81", 0x5f, 0x6, 0x0, 0x1, r9}, &(0x7f00000033c0)={0x0, 0x0, 0x0, 0x5, 0x200, r2, &(0x7f00000023c0)="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", 0x1000, 0x3, 0x0, 0x2, r11}, &(0x7f0000003500)={0x0, 0x0, 0x0, 0x8, 0x1000, 0xffffffffffffffff, &(0x7f0000003400)="8ee2aa51b1c5011e5c45bf168649e8b37857428cd26e0d16088b4752dbb710c050b86a7561fadc32acddbf8c22e43d803107c9c10d734a1fcff017785b9f2c86ff29cbeb6b2a4b7cf490792dfedaaac8aee5d77baa95346416eb18ebf1197aaf01cb56c06b978caef518222795acc31edaac8ae8c95ccb054b0ebd69b1326d37791c78ce8a11f88860cfd32112a57f196abe08028b677332e933e23e701d2ecf412d58be7fdb8da843ca28d384814d724c3d2f91868b0ae06e0137bdef9307ad30be7f", 0xc3, 0x800, 0x0, 0x2, r13}, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x6dac6ad755d4ea93, 0x7, 0xffffffffffffffff, &(0x7f0000003540), 0x0, 0x2, 0x0, 0x0, r15}, &(0x7f0000003780)={0x0, 0x0, 0x0, 0x0, 0x7ff, r16, &(0x7f00000036c0)="95a509d6248a40bd6e4fd512b1e9911c967ecb62dd66bdd78e0b8f61e36c67571662571710e953693009421326ccf716e0b698992aeed64672d2d710f24eb55411b9a3816eb9b1b4e0581841629c68e744b2625686e8b5af45dfeae7f07b2101e7cf", 0x62, 0x1, 0x0, 0x3, r17}, &(0x7f0000003840)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, &(0x7f00000037c0)="b383fb347426c9fdabf9e92a4b5871744ed15f9810df164891de1e2f06082052f84df59d36aea54cab58464ba73f599324f53738496965e2f5003da7bcda3936996372451c2cace5f6378bc693df6ff6c56599eddff86953e6f3fa191871bf955e5de204", 0x64, 0x8bc, 0x0, 0x3, r19}]) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0d1f0000070200000004000000"], 0xd) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) r21 = fcntl$dupfd(r20, 0x0, r20) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:54 executing program 3: 23:56:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710000300000001ffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:54 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(0x0, r1, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 643.523801] protocol 88fb is buggy, dev hsr_slave_0 [ 643.528945] protocol 88fb is buggy, dev hsr_slave_1 23:56:54 executing program 3: 23:56:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:54 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71000030000003fffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000080)=@un=@abs, 0x80, 0x0}, 0x0) 23:56:54 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x4, 0x0, 0x0, 0x0, 0x40, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b", 0x23}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = semget$private(0x0, 0x1, 0x0) semctl$SETALL(r2, 0x0, 0x14, &(0x7f0000000080)) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)=[0x8000, 0x6, 0x5]) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000100)=""/149, 0x207a0cb3) 23:56:54 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(0x0, 0x3800000, 0x4000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa03cf57ebe97d9f17feb9ecbb902bba49b205a24242985ee7d785a97c5fedba0b23baadcc33fc133c1ad163188d2a87837a6796c1c66bb0443622369a069e4fddb47942e85245c06f9b1231317ba38b61ef1f7aec4d53c1ad490aa5a944af7666ac09e30f8d4da8130f5129", 0xcb, 0x1a0}]) 23:56:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ff00000001ffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:54 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000800)="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", 0x200}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup2(r1, r2) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 644.132823] loop3: p1 < > p4 [ 644.137310] FAT-fs (loop2): unable to read boot sector (logical sector size = 1024) [ 644.151506] loop3: partition table partially beyond EOD, truncated [ 644.178429] loop3: p1 size 2 extends beyond EOD, truncated [ 644.247643] FAT-fs (loop2): unable to read boot sector (logical sector size = 1024) [ 644.260017] loop3: p4 start 1854537728 is beyond EOD, truncated [ 644.268040] device bridge_slave_1 left promiscuous mode [ 644.281510] bridge0: port 2(bridge_slave_1) entered disabled state [ 644.347637] device bridge_slave_0 left promiscuous mode [ 644.353481] bridge0: port 1(bridge_slave_0) entered disabled state 23:56:55 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(0x0, r1, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ff0000003fffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:55 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:55 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(0x0, 0x3800000, 0x4000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa03cf57ebe97d9f17feb9ecbb902bba49b205a24242985ee7d785a97c5fedba0b23baadcc33fc133c1ad163188d2a87837a6796c1c66bb0443622369a069e4fddb47942e85245c06f9b1231317ba38b61ef1f7aec4d53c1ad490aa5a944af7666ac09e30f8d4da8130f5129", 0xcb, 0x1a0}]) 23:56:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffff00000001ffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 644.684844] loop3: p1 < > p4 [ 644.693004] loop3: partition table partially beyond EOD, truncated [ 644.712447] device hsr_slave_1 left promiscuous mode [ 644.723768] protocol 88fb is buggy, dev hsr_slave_0 [ 644.728873] protocol 88fb is buggy, dev hsr_slave_1 23:56:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffff0000003fffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 644.762516] loop3: p1 size 2 extends beyond EOD, truncated [ 644.803575] device hsr_slave_0 left promiscuous mode [ 644.819178] loop3: p4 start 1854537728 is beyond EOD, truncated [ 644.888248] team0 (unregistering): Port device team_slave_1 removed 23:56:55 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(0x0, 0x3800000, 0x4000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa03cf57ebe97d9f17feb9ecbb902bba49b205a24242985ee7d785a97c5fedba0b23baadcc33fc133c1ad163188d2a87837a6796c1c66bb0443622369a069e4fddb47942e85245c06f9b1231317ba38b61ef1f7aec4d53c1ad490aa5a944af7666ac09e30f8d4da8130f5129", 0xcb, 0x1a0}]) 23:56:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffff00000001ffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 644.985654] team0 (unregistering): Port device team_slave_0 removed [ 645.065879] bond0 (unregistering): Releasing backup interface bond_slave_1 23:56:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffff0000003fffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 645.129312] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 645.196129] loop3: p1 < > p4 [ 645.207185] loop3: partition table partially beyond EOD, truncated [ 645.252614] loop3: p1 size 2 extends beyond EOD, truncated 23:56:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffff00000001ffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 645.341876] loop3: p4 start 1854537728 is beyond EOD, truncated [ 645.486544] bond0 (unregistering): Released all slaves [ 646.839879] IPVS: ftp: loaded support on port[0] = 21 [ 646.917688] chnl_net:caif_netlink_parms(): no params data found [ 646.951547] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.958062] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.965411] device bridge_slave_0 entered promiscuous mode [ 646.972296] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.978806] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.985913] device bridge_slave_1 entered promiscuous mode [ 647.004500] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 647.013618] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 647.031065] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 647.038662] team0: Port device team_slave_0 added [ 647.044508] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 647.051819] team0: Port device team_slave_1 added [ 647.057292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 647.064817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 647.116655] device hsr_slave_0 entered promiscuous mode [ 647.154217] device hsr_slave_1 entered promiscuous mode [ 647.194226] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 647.201154] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 647.219804] bridge0: port 2(bridge_slave_1) entered blocking state [ 647.226201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 647.232782] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.239174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 647.275237] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 647.281332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 647.290115] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 647.299857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 647.308196] bridge0: port 1(bridge_slave_0) entered disabled state [ 647.315246] bridge0: port 2(bridge_slave_1) entered disabled state [ 647.322274] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 647.332625] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 647.338780] 8021q: adding VLAN 0 to HW filter on device team0 [ 647.349030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 647.357058] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.363432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 647.374251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 647.381799] bridge0: port 2(bridge_slave_1) entered blocking state [ 647.388186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 647.405014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 647.412791] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 647.422219] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 647.440072] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 647.451182] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 647.461995] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 647.468801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 647.476677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 647.484713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 647.500001] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 647.507636] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 647.514554] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 647.526141] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 647.583812] net_ratelimit: 2 callbacks suppressed [ 647.583820] protocol 88fb is buggy, dev hsr_slave_0 [ 647.593826] protocol 88fb is buggy, dev hsr_slave_1 23:56:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:58 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r1 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(0x0, r1, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:58 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(0x0, 0x3800000, 0x4000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_read_part_table(0x2, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa03cf57ebe97d9f17feb9ecbb902bba49b205a24242985ee7d785a97c5fedba0b23baadcc33fc133c1ad163188d2a87837a6796c1c66bb0443622369a069e4fddb47942e85245c06f9b1231317ba38b61ef1f7aec4d53c1ad490aa5a944af7666ac09e30f8d4da8130f5129", 0xcb, 0x1a0}]) 23:56:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffff0000003fffffffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:58 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:56:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r4) r5 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xff40) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x80000001, 0x0) 23:56:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffff0000003fffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 647.878891] loop3: p1 < > p4 [ 647.890338] loop3: partition table partially beyond EOD, truncated 23:56:58 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r4) r5 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xff40) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x80000001, 0x0) [ 647.919755] loop3: p1 size 2 extends beyond EOD, truncated 23:56:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 647.984206] loop3: p4 start 1854537728 is beyond EOD, truncated 23:56:59 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, 0x0, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:56:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffff00000001ffe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:59 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r4) r5 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xff40) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x80000001, 0x0) 23:56:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:56:59 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(0x0, 0x3800000, 0x4000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 23:56:59 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000000)=ANY=[@ANYBLOB="0daaaaaaaaaa000000ff000008004500005c0000000000019078ac7014bbac14141105029078000006004b0000000000000000110000ac1414aaac141400082c0000ac1e000100000000e000000200000000e0000001000000010000000000000000"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r1, 0x2, 0x4, 0xffffffffffffff8e) rt_sigprocmask(0x1, &(0x7f00000000c0)={0x9}, &(0x7f0000000100), 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f0000000080)=0x2) 23:56:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffff0000003fffe7ee00000000000000000200000000", 0x58}], 0x1) [ 648.643731] protocol 88fb is buggy, dev hsr_slave_0 [ 648.648909] protocol 88fb is buggy, dev hsr_slave_1 23:56:59 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(0x0, 0x3800000, 0x4000) 23:56:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffff00000001e7ee00000000000000000200000000", 0x58}], 0x1) 23:56:59 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x804, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 648.884119] protocol 88fb is buggy, dev hsr_slave_0 [ 648.889276] protocol 88fb is buggy, dev hsr_slave_1 23:56:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffff0000003fe7ee00000000000000000200000000", 0x58}], 0x1) 23:56:59 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) [ 649.014600] device bridge_slave_1 left promiscuous mode [ 649.020120] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.095522] device bridge_slave_0 left promiscuous mode [ 649.114227] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.283724] protocol 88fb is buggy, dev hsr_slave_0 [ 649.288885] protocol 88fb is buggy, dev hsr_slave_1 [ 649.359085] device hsr_slave_1 left promiscuous mode [ 649.418283] device hsr_slave_0 left promiscuous mode 23:57:00 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, 0x0, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee02000000000000000200000000", 0x58}], 0x1) [ 649.480662] team0 (unregistering): Port device team_slave_1 removed [ 649.521524] team0 (unregistering): Port device team_slave_0 removed [ 649.576617] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 649.662375] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 649.764110] bond0 (unregistering): Released all slaves 23:57:00 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) [ 650.836600] IPVS: ftp: loaded support on port[0] = 21 [ 650.944538] chnl_net:caif_netlink_parms(): no params data found [ 650.979713] bridge0: port 1(bridge_slave_0) entered blocking state [ 650.986439] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.993779] device bridge_slave_0 entered promiscuous mode [ 651.000846] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.007446] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.014701] device bridge_slave_1 entered promiscuous mode [ 651.034577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 651.044168] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 651.062268] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 651.069658] team0: Port device team_slave_0 added [ 651.075956] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 651.083253] team0: Port device team_slave_1 added [ 651.088670] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 651.096070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 651.416062] device hsr_slave_0 entered promiscuous mode [ 651.464105] device hsr_slave_1 entered promiscuous mode [ 651.504311] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 651.643023] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 651.658706] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.665124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 651.671759] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.678179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 651.828969] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 651.835205] 8021q: adding VLAN 0 to HW filter on device bond0 [ 651.843591] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 651.965862] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 651.971959] 8021q: adding VLAN 0 to HW filter on device team0 [ 651.978550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 651.986502] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.993459] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.001244] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 652.012963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 652.022719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 652.033182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 652.040992] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.047394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 652.056640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 652.176458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 652.184740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 652.192409] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.198821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 652.207771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 652.215399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 652.225652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 652.232506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 652.357360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 652.365074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 652.373174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 652.382156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 652.391464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 652.398650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 652.407002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 652.534155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 652.543221] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 652.550643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 652.558387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 652.565931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 652.573328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 652.696731] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 652.702774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 652.717580] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 652.725072] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 652.731331] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 652.738360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 652.863499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 652.896300] device bridge_slave_1 left promiscuous mode [ 652.901831] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.944963] device bridge_slave_0 left promiscuous mode [ 652.951690] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.033749] protocol 88fb is buggy, dev hsr_slave_0 [ 653.038882] protocol 88fb is buggy, dev hsr_slave_1 [ 653.053943] protocol 88fb is buggy, dev hsr_slave_0 [ 653.059065] protocol 88fb is buggy, dev hsr_slave_1 [ 653.153757] protocol 88fb is buggy, dev hsr_slave_0 [ 653.158868] protocol 88fb is buggy, dev hsr_slave_1 [ 653.444080] protocol 88fb is buggy, dev hsr_slave_0 [ 653.449238] protocol 88fb is buggy, dev hsr_slave_1 [ 653.683752] protocol 88fb is buggy, dev hsr_slave_0 [ 653.683908] protocol 88fb is buggy, dev hsr_slave_0 [ 656.255453] device hsr_slave_1 left promiscuous mode [ 656.296843] device hsr_slave_0 left promiscuous mode [ 656.358456] team0 (unregistering): Port device team_slave_1 removed [ 656.371804] team0 (unregistering): Port device team_slave_0 removed [ 656.382497] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 656.447865] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 656.534355] bond0 (unregistering): Released all slaves 23:57:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee04000000000000000200000000", 0x58}], 0x1) 23:57:07 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) 23:57:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x54, 0x10, 0x400, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x24, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_VER={0x8, 0x16, 0x1}, @IFLA_GRE_PMTUDISC={0x8, 0xa, 0x1}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x3}, @IFLA_GRE_ENCAP_DPORT={0x8, 0x11, 0x4e27}]]}}}]}, 0x54}}, 0x0) 23:57:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:07 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:57:07 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, 0x0, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0a000000000000000200000000", 0x58}], 0x1) 23:57:07 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:57:07 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) 23:57:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:07 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x0, 0x0) 23:57:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0e000000000000000200000000", 0x58}], 0x1) 23:57:07 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) sendfile(r1, r1, 0x0, 0x2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) 23:57:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 658.976656] IPVS: ftp: loaded support on port[0] = 21 [ 659.045831] chnl_net:caif_netlink_parms(): no params data found [ 659.089525] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.096300] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.103317] device bridge_slave_0 entered promiscuous mode [ 659.110502] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.117864] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.125352] device bridge_slave_1 entered promiscuous mode [ 659.161357] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 659.170580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 659.197166] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 659.204894] team0: Port device team_slave_0 added [ 659.210414] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 659.218215] team0: Port device team_slave_1 added [ 659.223561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 659.231216] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 659.286660] device hsr_slave_0 entered promiscuous mode [ 659.323981] device hsr_slave_1 entered promiscuous mode [ 659.374466] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 659.387425] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 659.404443] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.410843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.417578] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.424004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.468284] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 659.475220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 659.490024] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 659.499240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 659.506683] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.515086] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.522602] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 659.533634] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 659.540208] 8021q: adding VLAN 0 to HW filter on device team0 [ 659.553301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 659.562078] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.568515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 659.585039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 659.592762] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.599270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 659.611663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 659.619747] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 659.634501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 659.651647] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 659.661801] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 659.672775] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 659.680432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 659.688416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 659.697632] device bridge_slave_1 left promiscuous mode [ 659.703109] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.744527] device bridge_slave_0 left promiscuous mode [ 659.750051] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.885692] device hsr_slave_1 left promiscuous mode [ 659.927669] device hsr_slave_0 left promiscuous mode [ 659.987691] team0 (unregistering): Port device team_slave_1 removed [ 660.000119] team0 (unregistering): Port device team_slave_0 removed [ 660.010603] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 660.067957] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 660.150100] bond0 (unregistering): Released all slaves [ 660.197376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 660.210013] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 660.211749] IPVS: ftp: loaded support on port[0] = 21 [ 660.224365] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 660.231017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 660.238446] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 660.258994] 8021q: adding VLAN 0 to HW filter on device batadv0 23:57:10 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x0, 0x0) 23:57:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0f000000000000000200000000", 0x58}], 0x1) 23:57:10 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) r3 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:10 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x12) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r1 = gettid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x220000, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000340)={0x2, 0x7}) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x0, 0x0, 0x0, r1}) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffc98, &(0x7f0000000400)='\x00', 0xffffffffffffffff}, 0xffff) syz_open_procfs(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x58, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x2, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x5, 0xffff) r4 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in6=@empty, 0x4e22, 0x32, 0x4e21, 0x20, 0x0, 0x10, 0x20, 0x32, 0x0, r4}, {0x0, 0xc22, 0x5, 0x0, 0x0, 0x400}, {0xd4d9, 0x7a, 0x100, 0x8}, 0x200, 0x0, 0x2, 0x0, 0x5}, {{@in6=@rand_addr="791feb8c39c2d948aeabfef0c2c8f4f3", 0x4d5, 0x2b}, 0x0, @in=@multicast2, 0x0, 0x1, 0x2, 0x3, 0x0, 0x3f, 0x2}}, 0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) fcntl$dupfd(r5, 0x0, r3) ioctl$sock_SIOCOUTQ(r5, 0x5411, &(0x7f00000000c0)) unshare(0x40000000) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(0xffffffffffffffff, 0x0, r6, 0x0, 0x8100000, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x40b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:57:10 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x0) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:11 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) r3 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:11 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x0, 0x0) [ 660.448777] chnl_net:caif_netlink_parms(): no params data found 23:57:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee60000000000000000200000000", 0x58}], 0x1) 23:57:11 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='s\x00\x00\x00sOlinuw\xeb\x00', &(0x7f00000002c0)='system_u:objec\x02\x00\x00\x00\x00\x00\x00\x005\x99\xa2\x1935]\x87\xb1_\x99%(td', 0x25, 0x2) r3 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 660.685773] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.713183] IPVS: ftp: loaded support on port[0] = 21 [ 660.721527] bridge0: port 1(bridge_slave_0) entered disabled state 23:57:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7eedf000000000000000200000000", 0x58}], 0x1) [ 660.745988] device bridge_slave_0 entered promiscuous mode 23:57:11 executing program 4 (fault-call:13 fault-nth:0): r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) [ 660.802548] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.852448] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.900938] device bridge_slave_1 entered promiscuous mode [ 660.931049] FAULT_INJECTION: forcing a failure. [ 660.931049] name failslab, interval 1, probability 0, space 0, times 0 [ 660.970539] CPU: 0 PID: 13371 Comm: syz-executor.4 Not tainted 4.19.83 #0 [ 660.977514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.986869] Call Trace: [ 660.989467] dump_stack+0x172/0x1f0 [ 660.993098] should_fail.cold+0xa/0x1b [ 660.997003] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 661.002099] ? lock_downgrade+0x880/0x880 [ 661.006244] __should_failslab+0x121/0x190 [ 661.010471] should_failslab+0x9/0x14 [ 661.014265] kmem_cache_alloc_node_trace+0x274/0x720 [ 661.019363] ? _raw_spin_unlock_bh+0x31/0x40 [ 661.023772] ? release_sock+0x156/0x1c0 [ 661.027811] __get_vm_area_node+0x12b/0x3a0 [ 661.032126] __vmalloc_node_range+0xc7/0x790 [ 661.036585] ? netlink_sendmsg+0x640/0xd70 [ 661.040824] ? netlink_sendmsg+0x640/0xd70 [ 661.045047] vmalloc+0x6b/0x90 [ 661.048228] ? netlink_sendmsg+0x640/0xd70 [ 661.052449] netlink_sendmsg+0x640/0xd70 [ 661.056505] ? netlink_unicast+0x720/0x720 [ 661.060780] ? selinux_socket_sendmsg+0x36/0x40 [ 661.065523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.071082] ? security_socket_sendmsg+0x8d/0xc0 [ 661.075827] ? netlink_unicast+0x720/0x720 [ 661.080051] sock_sendmsg+0xd7/0x130 [ 661.083753] kernel_sendmsg+0x44/0x50 [ 661.087542] sock_no_sendpage+0x116/0x150 [ 661.091692] ? sock_kfree_s+0x70/0x70 [ 661.095481] ? avc_has_perm+0x379/0x610 [ 661.099453] ? lock_acquire+0x16f/0x3f0 [ 661.103451] ? pipe_lock+0x6e/0x80 [ 661.106984] kernel_sendpage+0x92/0xf0 [ 661.110867] ? sock_kfree_s+0x70/0x70 [ 661.114667] sock_sendpage+0x8b/0xc0 [ 661.118429] pipe_to_sendpage+0x296/0x360 [ 661.122567] ? kernel_sendpage+0xf0/0xf0 [ 661.126629] ? direct_splice_actor+0x190/0x190 [ 661.131199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.136757] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 661.142114] __splice_from_pipe+0x391/0x7d0 [ 661.146423] ? direct_splice_actor+0x190/0x190 [ 661.150994] ? direct_splice_actor+0x190/0x190 [ 661.155584] splice_from_pipe+0x108/0x170 [ 661.159730] ? splice_shrink_spd+0xd0/0xd0 [ 661.163959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.169486] ? security_file_permission+0x89/0x230 [ 661.174404] generic_splice_sendpage+0x3c/0x50 [ 661.178974] ? splice_from_pipe+0x170/0x170 [ 661.183285] do_splice+0x642/0x12c0 [ 661.186910] ? opipe_prep.part.0+0x2d0/0x2d0 [ 661.191345] ? __fget_light+0x1a9/0x230 [ 661.195310] __x64_sys_splice+0x2c6/0x330 [ 661.199452] do_syscall_64+0xfd/0x620 [ 661.203244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.208427] RIP: 0033:0x45a219 [ 661.211610] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.230497] RSP: 002b:00007faaaf41bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 661.238194] RAX: ffffffffffffffda RBX: 00007faaaf41bc90 RCX: 000000000045a219 [ 661.245452] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 0000000000000006 [ 661.252708] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 661.259961] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faaaf41c6d4 [ 661.267312] R13: 00000000004ca1a6 R14: 00000000004e1350 R15: 0000000000000009 [ 661.363840] net_ratelimit: 16 callbacks suppressed [ 661.363847] protocol 88fb is buggy, dev hsr_slave_0 [ 661.368874] protocol 88fb is buggy, dev hsr_slave_1 [ 661.374317] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 661.399769] IPVS: ftp: loaded support on port[0] = 21 [ 661.407708] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 661.417488] syz-executor.4: vmalloc: allocation failure: 4288 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 661.438547] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 661.462156] CPU: 1 PID: 13371 Comm: syz-executor.4 Not tainted 4.19.83 #0 [ 661.469127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.478488] Call Trace: [ 661.481103] dump_stack+0x172/0x1f0 [ 661.484784] warn_alloc.cold+0x7b/0x173 [ 661.488776] ? zone_watermark_ok_safe+0x260/0x260 [ 661.493630] ? __get_vm_area_node+0x12b/0x3a0 [ 661.498203] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.503249] ? __get_vm_area_node+0x2df/0x3a0 [ 661.507765] __vmalloc_node_range+0x486/0x790 [ 661.512283] ? netlink_sendmsg+0x640/0xd70 [ 661.516530] vmalloc+0x6b/0x90 [ 661.519734] ? netlink_sendmsg+0x640/0xd70 [ 661.523982] netlink_sendmsg+0x640/0xd70 [ 661.528065] ? netlink_unicast+0x720/0x720 [ 661.532315] ? selinux_socket_sendmsg+0x36/0x40 [ 661.536995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.542550] ? security_socket_sendmsg+0x8d/0xc0 [ 661.547328] ? netlink_unicast+0x720/0x720 [ 661.551578] sock_sendmsg+0xd7/0x130 [ 661.555300] kernel_sendmsg+0x44/0x50 [ 661.559110] sock_no_sendpage+0x116/0x150 [ 661.563267] ? sock_kfree_s+0x70/0x70 [ 661.567075] ? avc_has_perm+0x379/0x610 [ 661.571077] ? lock_acquire+0x16f/0x3f0 [ 661.575059] ? pipe_lock+0x6e/0x80 [ 661.578878] kernel_sendpage+0x92/0xf0 [ 661.582785] ? sock_kfree_s+0x70/0x70 [ 661.586600] sock_sendpage+0x8b/0xc0 [ 661.590331] pipe_to_sendpage+0x296/0x360 [ 661.594495] ? kernel_sendpage+0xf0/0xf0 [ 661.598570] ? direct_splice_actor+0x190/0x190 [ 661.603167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.608714] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 661.614102] __splice_from_pipe+0x391/0x7d0 [ 661.618439] ? direct_splice_actor+0x190/0x190 [ 661.623048] ? direct_splice_actor+0x190/0x190 [ 661.627640] splice_from_pipe+0x108/0x170 [ 661.631799] ? splice_shrink_spd+0xd0/0xd0 [ 661.636060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.641608] ? security_file_permission+0x89/0x230 [ 661.646560] generic_splice_sendpage+0x3c/0x50 [ 661.651159] ? splice_from_pipe+0x170/0x170 [ 661.655493] do_splice+0x642/0x12c0 [ 661.659145] ? opipe_prep.part.0+0x2d0/0x2d0 [ 661.663570] ? __fget_light+0x1a9/0x230 [ 661.667560] __x64_sys_splice+0x2c6/0x330 [ 661.671730] do_syscall_64+0xfd/0x620 [ 661.675545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.680742] RIP: 0033:0x45a219 [ 661.683948] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.702865] RSP: 002b:00007faaaf41bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 661.710595] RAX: ffffffffffffffda RBX: 00007faaaf41bc90 RCX: 000000000045a219 [ 661.717876] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 0000000000000006 [ 661.725166] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 661.732445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faaaf41c6d4 [ 661.739725] R13: 00000000004ca1a6 R14: 00000000004e1350 R15: 0000000000000009 [ 661.753790] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 661.761395] team0: Port device team_slave_0 added [ 661.773892] protocol 88fb is buggy, dev hsr_slave_0 [ 661.775119] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 661.779071] protocol 88fb is buggy, dev hsr_slave_1 [ 661.791337] team0: Port device team_slave_1 added [ 661.805405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 661.812876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 661.821799] Mem-Info: [ 661.825398] active_anon:127509 inactive_anon:193 isolated_anon:0 [ 661.825398] active_file:12911 inactive_file:46486 isolated_file:0 [ 661.825398] unevictable:0 dirty:158 writeback:0 unstable:0 [ 661.825398] slab_reclaimable:13150 slab_unreclaimable:113360 [ 661.825398] mapped:59202 shmem:245 pagetables:1088 bounce:0 [ 661.825398] free:1216713 free_pcp:425 free_cma:0 [ 661.867697] Node 0 active_anon:510036kB inactive_anon:772kB active_file:51496kB inactive_file:185944kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236808kB dirty:624kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 92160kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 661.902581] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:8kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 661.935474] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 661.977177] lowmem_reserve[]: 0 2555 2557 2557 [ 662.005737] Node 0 DMA32 free:1068216kB min:36248kB low:45308kB high:54368kB active_anon:509936kB inactive_anon:772kB active_file:51496kB inactive_file:186044kB unevictable:0kB writepending:624kB present:3129332kB managed:2619976kB mlocked:0kB kernel_stack:7264kB pagetables:4352kB bounce:0kB free_pcp:1632kB local_pcp:688kB free_cma:0kB [ 662.044330] lowmem_reserve[]: 0 0 2 2 [ 662.048172] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 662.103835] lowmem_reserve[]: 0 0 0 0 [ 662.110546] device hsr_slave_0 entered promiscuous mode [ 662.116113] Node 1 Normal free:3783276kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:8kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 662.152906] lowmem_reserve[]: 0 0 0 0 [ 662.156941] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 662.183713] Node 0 DMA32: 252*4kB (UE) 2980*8kB (UME) 2232*16kB (ME) 1410*32kB (ME) 1031*64kB (UME) 398*128kB (UME) 59*256kB (UM) 63*512kB (UM) 26*1024kB (UME) 4*2048kB (UME) 186*4096kB (M) = 1066640kB [ 662.184056] device hsr_slave_1 entered promiscuous mode [ 662.234164] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 662.246107] Node 1 Normal: 67*4kB (UE) 248*8kB (UME) 266*16kB (UME) 60*32kB (U) 16*64kB (UM) 13*128kB (UE) 7*256kB (UM) 4*512kB (UME) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783276kB [ 662.264211] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 662.273325] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 662.277773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 662.282283] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 662.297812] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 662.308274] 59680 total pagecache pages [ 662.312658] 0 pages in swap cache [ 662.312710] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 662.316489] Swap cache stats: add 0, delete 0, find 0/0 [ 662.329067] Free swap = 0kB [ 662.332303] Total swap = 0kB [ 662.344361] 1965979 pages RAM [ 662.355305] 0 pages HighMem/MovableOnly [ 662.361780] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 662.368570] 338855 pages reserved [ 662.379383] 0 pages cma reserved [ 662.507711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 662.527096] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 662.536574] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 662.542756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 662.550793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 662.564476] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 662.570728] 8021q: adding VLAN 0 to HW filter on device team0 [ 662.587625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 662.612902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 662.624334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 662.644186] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.650575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 662.666333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 662.673966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 662.690527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 662.711856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 662.750562] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.756987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 662.766756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 662.776857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 662.787403] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 662.801441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 662.822012] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 662.844240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 662.852199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 662.869856] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 662.924168] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 662.931399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 662.953107] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 662.966704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 662.976411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 662.995362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 663.016205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 663.031073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 663.044816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 663.053612] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 663.063849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 663.087212] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 663.100848] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 663.109715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 663.118854] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 663.141769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 663.393758] protocol 88fb is buggy, dev hsr_slave_0 [ 663.398934] protocol 88fb is buggy, dev hsr_slave_1 [ 663.443739] protocol 88fb is buggy, dev hsr_slave_0 [ 663.448857] protocol 88fb is buggy, dev hsr_slave_1 [ 663.513945] protocol 88fb is buggy, dev hsr_slave_0 [ 663.519052] protocol 88fb is buggy, dev hsr_slave_1 23:57:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7eef0000000000000000200000000", 0x58}], 0x1) 23:57:14 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000400)=0x4) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) 23:57:14 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x0) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 664.278597] device bridge_slave_1 left promiscuous mode [ 664.289067] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.345357] device bridge_slave_0 left promiscuous mode [ 664.352068] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.515680] device hsr_slave_1 left promiscuous mode [ 664.557024] device hsr_slave_0 left promiscuous mode [ 664.616668] team0 (unregistering): Port device team_slave_1 removed [ 664.632956] team0 (unregistering): Port device team_slave_0 removed [ 664.644463] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 664.689285] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 664.757252] bond0 (unregistering): Released all slaves 23:57:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x7a, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000140)=0x400) 23:57:15 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 23:57:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000a0000000000000200000000", 0x58}], 0x1) 23:57:15 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f0000000300)=0x5, 0x4) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) 23:57:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:15 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x0) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000e0000000000000200000000", 0x58}], 0x1) 23:57:16 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc2fcd6be7b19af8a) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x3}, 0x28, 0x2) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) [ 665.546296] selinux_nlmsg_perm: 65 callbacks suppressed [ 665.546315] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 [ 665.674921] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 [ 665.736376] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 23:57:16 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(r5, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000300)=0x80) bind$inet6(r6, &(0x7f0000ed3fe4)={0xa, 0x4e60, 0x0, @loopback}, 0x1b0) shutdown(r0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) r9 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5ad, 0x200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r11, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xe5, "3b8e157f1220f8469f8f577e3a80b8f6fd6e7136d5d12ec3373577fa617818463bd735e49af3bb40e6638155bfd2560d4910aba0dcec263b2013cdb2a2b17058b94546a11138b24b3e70541c3af5947322cc5630a15c08cf4c28512663fdd8d9ea517a4838e2031054da63b060ca7fb94543bf3f2b53fd450ac4e9b1e3a06d79ca4000e9109c665681a5cb716eab1cafe3c64cd413543e6b0ba2c344022e72df80d54abe114437e98657c0a04b5ea95835b5c16055efbed956d814e8bc5da9a1b694cc3f12a02642c9e0dd495c22fc6e84ffaeb971a49a0451a948eff6f86088f569ce6706"}, &(0x7f0000000180)=0xed) setsockopt$inet_sctp_SCTP_AUTH_KEY(r9, 0x84, 0x17, &(0x7f00000001c0)={r12, 0x1, 0x89, "8b46610bc00a5cd8e543e86a5d0966391ba9c42f4060e6dd777ec965be21c9e88a196c046630f4f06635b399983875f4a77d0939a6366f54ea8436814fccafd748c7d53b53dec632446022ea34386af0baf47f364799c321cfe7b9e2683e86f3177f12f4286893b2a93f1547b4f5a3e5946aa043ee0397169acf05ecc96ba649dffdd78261e5797d0c"}, 0x91) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0xffffffffffffff27) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000f96000)={0x1, 0x7fff}, 0x8) sendmmsg(r0, &(0x7f00000023c0)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000000)="c2", 0x1}], 0x1}}], 0x1, 0x8004) close(r0) 23:57:16 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000340), 0xc2fcd6be7b19af8a) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000f0000000000000200000000", 0x58}], 0x1) [ 665.791393] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 [ 665.844299] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 [ 665.903072] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 [ 665.929375] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 23:57:16 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:16 executing program 2: ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(0xffffffffffffffff, 0xc0305602, &(0x7f0000000240)={0x0, 0x7, 0x2016}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000034000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x338) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000034000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x338) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000a8a000)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x8000, 0x2, 0x8}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x5, @remote, 0xd7}}, 0x0, 0x8, 0x6, 0x6}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x9, 0x4, 0x23}, 0x10) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x200}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) pipe(&(0x7f0000000040)) unshare(0x40000000) [ 666.062400] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 [ 666.084340] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 [ 666.113965] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13402 comm=syz-executor.4 23:57:16 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0xf51, 0x0) 23:57:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00600000000000000200000000", 0x58}], 0x1) 23:57:16 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) sendfile(r1, r1, 0x0, 0x2) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) [ 666.318739] IPVS: ftp: loaded support on port[0] = 21 [ 666.753942] IPVS: ftp: loaded support on port[0] = 21 [ 668.091976] IPVS: ftp: loaded support on port[0] = 21 [ 668.322649] chnl_net:caif_netlink_parms(): no params data found [ 668.400799] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.407867] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.415842] device bridge_slave_0 entered promiscuous mode [ 668.425211] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.431985] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.439814] device bridge_slave_1 entered promiscuous mode [ 668.466186] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 668.476220] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 668.501501] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 668.509860] team0: Port device team_slave_0 added [ 668.515916] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 668.523478] team0: Port device team_slave_1 added [ 668.528923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 668.536624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 668.616565] device hsr_slave_0 entered promiscuous mode [ 668.684101] device hsr_slave_1 entered promiscuous mode [ 668.755152] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 668.762143] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 668.811877] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.818358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.825035] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.831428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.948916] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 668.955078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 668.964531] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 668.974463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.983817] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.990563] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.998318] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 669.021552] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 669.028095] 8021q: adding VLAN 0 to HW filter on device team0 [ 669.040783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 669.049488] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.055879] bridge0: port 1(bridge_slave_0) entered forwarding state [ 669.075605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 669.083238] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.089623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 669.098809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 669.117908] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 669.126440] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 669.134356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 669.141840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 669.152233] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 669.159374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 669.179552] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 669.188600] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 669.198811] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 669.211217] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 669.394976] net_ratelimit: 8 callbacks suppressed [ 669.395002] protocol 88fb is buggy, dev hsr_slave_0 [ 669.405491] protocol 88fb is buggy, dev hsr_slave_1 23:57:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:20 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:20 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) sendfile(r1, r1, 0x0, 0x2) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 23:57:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00df0000000000000200000000", 0x58}], 0x1) 23:57:20 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000002, 0x0) 23:57:20 executing program 2: open(0x0, 0x200000, 0x0) mknod(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/gro<#\xfbW\xdd.\xa5\xd4\xa3\x10\x1f3\x9dhc\xaf\xa4\x1b\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5', 0x2761, 0x0) r1 = fcntl$getown(r0, 0x9) write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0xffffffffffffffc3) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r2 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x0) dup(0xffffffffffffffff) ioctl$TCXONC(r2, 0x540a, 0xfffffffffffffff8) r4 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x0, r4}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'mangle\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00'}, 0x0) socket$inet6(0xa, 0x0, 0x0) inotify_init() socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, r2, 0x0) rename(0x0, 0x0) 23:57:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00f00000000000000200000000", 0x58}], 0x1) 23:57:20 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4001, 0x20) sendfile(r1, r1, 0x0, 0x2) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 23:57:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x0, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:20 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000003, 0x0) 23:57:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00400300000000000200000000", 0x58}], 0x1) 23:57:20 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00034000000000000200000000", 0x58}], 0x1) 23:57:20 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee6b6b6b00000000000200000000", 0x58}], 0x1) 23:57:20 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x0, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:20 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000005, 0x0) [ 670.483784] protocol 88fb is buggy, dev hsr_slave_0 [ 670.488953] protocol 88fb is buggy, dev hsr_slave_1 23:57:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7eefffff000000000000200000000", 0x58}], 0x1) 23:57:21 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:21 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000009, 0x0) [ 670.624527] device bridge_slave_1 left promiscuous mode [ 670.631257] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.643906] protocol 88fb is buggy, dev hsr_slave_0 [ 670.649033] protocol 88fb is buggy, dev hsr_slave_1 23:57:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000001000000000200000000", 0x58}], 0x1) [ 670.734859] device bridge_slave_0 left promiscuous mode [ 670.740384] bridge0: port 1(bridge_slave_0) entered disabled state 23:57:21 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:21 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 670.996946] device hsr_slave_1 left promiscuous mode [ 671.070710] device hsr_slave_0 left promiscuous mode [ 671.128628] team0 (unregistering): Port device team_slave_1 removed [ 671.172177] team0 (unregistering): Port device team_slave_0 removed [ 671.206092] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 671.269188] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 671.472824] bond0 (unregistering): Released all slaves [ 671.555047] selinux_nlmsg_perm: 80 callbacks suppressed [ 671.555061] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.582852] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.630231] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.664078] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.677287] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.694200] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.706916] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.719589] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.732633] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 671.745301] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13521 comm=syz-executor.4 [ 672.734366] IPVS: ftp: loaded support on port[0] = 21 [ 672.849784] chnl_net:caif_netlink_parms(): no params data found [ 672.889299] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.895997] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.903221] device bridge_slave_0 entered promiscuous mode [ 672.910564] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.917101] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.924654] device bridge_slave_1 entered promiscuous mode [ 672.951153] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 672.967518] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 672.988517] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 672.996191] team0: Port device team_slave_0 added [ 673.001957] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 673.009580] team0: Port device team_slave_1 added [ 673.015088] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 673.022601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 673.086712] device hsr_slave_0 entered promiscuous mode [ 673.144101] device hsr_slave_1 entered promiscuous mode [ 673.185380] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 673.192617] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 673.207924] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.214340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.220982] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.227393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.263280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 673.272976] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 673.282854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 673.290541] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.297454] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.574615] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 673.581100] 8021q: adding VLAN 0 to HW filter on device team0 [ 673.596062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 673.603919] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.610286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.617871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 673.625773] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.632182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.642224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 673.652361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 673.780671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 673.788280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 673.799081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 673.806937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 673.815341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 673.823244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 673.954137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 673.963214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 673.970749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 673.978908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 673.986884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 673.994880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 674.116278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 674.124026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 674.132245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 674.141322] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 674.150890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 674.164628] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 674.172480] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 674.178893] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 674.185931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 674.309074] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 674.484076] protocol 88fb is buggy, dev hsr_slave_0 [ 674.486430] protocol 88fb is buggy, dev hsr_slave_0 [ 674.489183] protocol 88fb is buggy, dev hsr_slave_1 [ 674.494411] protocol 88fb is buggy, dev hsr_slave_1 [ 674.504855] protocol 88fb is buggy, dev hsr_slave_0 [ 674.510400] protocol 88fb is buggy, dev hsr_slave_1 [ 674.623735] protocol 88fb is buggy, dev hsr_slave_0 [ 674.628854] protocol 88fb is buggy, dev hsr_slave_1 [ 674.643901] protocol 88fb is buggy, dev hsr_slave_0 [ 674.648996] protocol 88fb is buggy, dev hsr_slave_1 23:57:25 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:25 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 23:57:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000002000000000200000000", 0x58}], 0x1) 23:57:25 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16], &(0x7f0000000180)='\x83\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x0, 0x358, 0x0, 0x41100, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000000)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x400, 0x1, 0x100000}, 0x10}, 0x70) 23:57:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x0, 0x1, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:25 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x8000000a, 0x0) 23:57:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000004000000000200000000", 0x58}], 0x1) 23:57:25 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 23:57:25 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 23:57:25 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 23:57:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000000a000000000200000000", 0x58}], 0x1) 23:57:25 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000025, 0x0) 23:57:26 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, 0x0, 0x0, 0x0) 23:57:26 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 23:57:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000000e000000000200000000", 0x58}], 0x1) [ 675.640625] device bridge_slave_1 left promiscuous mode [ 675.678379] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.750984] device bridge_slave_0 left promiscuous mode [ 675.756941] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.215467] device hsr_slave_1 left promiscuous mode [ 679.256815] device hsr_slave_0 left promiscuous mode [ 679.337008] team0 (unregistering): Port device team_slave_1 removed [ 679.351234] team0 (unregistering): Port device team_slave_0 removed [ 679.361442] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 679.403579] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 679.486389] bond0 (unregistering): Released all slaves [ 679.543403] IPVS: ftp: loaded support on port[0] = 21 [ 679.628133] chnl_net:caif_netlink_parms(): no params data found [ 679.673269] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.679927] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.687892] device bridge_slave_0 entered promiscuous mode [ 679.695406] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.701797] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.709536] device bridge_slave_1 entered promiscuous mode [ 679.777220] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 679.795861] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 679.840612] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 679.856441] team0: Port device team_slave_0 added [ 679.863289] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 679.881463] team0: Port device team_slave_1 added [ 679.891044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 679.903349] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 679.994655] device hsr_slave_0 entered promiscuous mode [ 680.054160] device hsr_slave_1 entered promiscuous mode [ 680.094373] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 680.101381] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 680.155967] bridge0: port 2(bridge_slave_1) entered blocking state [ 680.162478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 680.169173] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.175555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 680.263077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 680.281138] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 680.291974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 680.300097] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.308629] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.322911] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 680.330174] 8021q: adding VLAN 0 to HW filter on device team0 [ 680.348518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 680.356925] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.363437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 680.385160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 680.392916] bridge0: port 2(bridge_slave_1) entered blocking state [ 680.399444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 680.408955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 680.427944] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 680.439265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 680.449977] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 680.457436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 680.465462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 680.474957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 680.485043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 680.499121] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 680.507339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 680.517123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 680.524792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 680.536533] 8021q: adding VLAN 0 to HW filter on device batadv0 23:57:31 executing program 2: syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x9) r2 = syz_open_dev$dspn(0x0, 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x4, "b13e1c20d1764d052a4289a71186ca1abfa7f39eb694f4602948f6585c3542ac42cb2f94b098e98f2bcd6128dab4a71d544e96e01e3a9a3548ee5f554c06d963346edb9d133e86fdd31c21e9aaffeb52f7cd63297b1fd0db1845e12bda3ce00f0cca0e6ac9c42a61e687c24c0553b408359c86c7bfd7a30944ac327f982b011258e85ee00f050c38e73199d07b72b225a96ab0fb5a9ea944a233e46cd4c25aaa0fe04bd9b3203f61a06c8f094563ffa0078e50248ce1acebc03c75069eb1cb20ebbe30ec063f9ebc45290dc4f8b56ebb08d32e4df04785fd385029f766a0b96db6a1b6615de63393fe97082c076a7170d2b1c06ce0627d6acae850c2b95f38b079a352f27bf6f5460078b8e597c1d3bdb5cf9e73f42eec5aea224ab44b94e18e812864faeaf770ba7471f99b07d41d573d1d4c3833fb4410ea36d710bfa66ccdb14a1927a678f873b023e82c341a43704adb37242a67b2a46d02ab7aee23cf3030a2f3dd58eece667b6e9393ee8d36649e37e83b1c73c0ef65b4df6173c1c25324fbb9afa1361dc4275f152deb03d7138a688eb9dc66e7845ce1be5647bf740b0e1dd038120ef1e3e1cf420cf8b723bef771376e433935e4f9096a10c4a969aceaac4791c41f365b274dab49bddf51b22a24c05ceaedcbf45febc927e98f410d38247d7679cee7b0d3041eaebd7821924ad31e7c5137bf87ce1ec537a981779f0a4c57bbbb5c641cfd02e1e3904f48b0be96fc9851b6bc8c4260168eea9d9d111e2777f78a9021d5eb0166e39410bf279656770263ca2fb7ac0e30d5e168f8cf4bc5665d057da939b770568e41d0fcec5d6aac0bf4ae66fb099b786cdce7f6a9bc00b83d8ed72440a9724d4ef8af71c7efbc31397930cdcb99d30502ecbcc7ddb9161ade16a1badbd7ea3c6c65b387b46234c4660c816506a2f76264bba07ecb685532116bd971464b58e3ea0a29c2fa1d49d9c6308806db01326e9a1b6bbb556f6479b29f48718e211d75f08d0fb477ad8dae5aeaad7e176b2c5ae331ef78212e9dd7e506549dc74ffd940dc91d74aee2fa7f28855919c163f443804e2a072ad8add2be84df87e414afcab0f8e6f67d3ebb1778a6798d50233da09d29b95c0da97304b7a025e50a7c89e614c63bc69477bfe0e5ae2c468332d134f9e22b19eb2f01c8e8d5148b9b980f8b9aa0cab9ba89aafe16d6a8cf9cb5ae659d8fba88e2841f3d6ac0c44dd9f03787d357fe31a4f551e247bfb73b1f2aa1e208c36aa90dcfc4da8877967c05fe951716ec2293d79c6083e79061bbe18150e2af1d889bb4e87c7735b0e7b88a3109a906d1bd4bf9b98c2462420ecc4e9f3a274a6678bc56e9aa7f3d64677141f874f35d00d04a1dc83126ccd69a0221305a3a5418ec24e163b165c1e4533c38f3d213de4012aece68ed11e2f42325d6da5eef78ee985f81a7991e3d1ff69188059c292779579418ef81177fa94b43cdd0fbf92d31f0fb592a864ddc98ddd5b49ece865e7c7a6c873169d0eea46c1a44f645b1cfa40849ffb9f5355ab396dc1a875180f17103be63be4e7d1920949c59ba5d47341c176ac307e165b9733ac5cd9e9691f5ecd76b467881b78f217d50903a06c57270f4104fd26d496dd7e08c27209185761882923f6447c73d53a74e28132e6bf97ee4f2df9d03be88653a9a7251d8df247f1a75f91f95886ce317e3c125aa7686eec86708fa72c9b33a664e76c0ed891ff9d840ac121ae3f96d32330a14fd76df19c7ae0434e2103d6e9175da0b6cc7a007a0a18615271771434959de305636cf7fbfdd16239bff7dbc656a702ebd48f9a2b1937cca80604ec525d292bb7337459235ad047c6933b6c81bd966ea60ec863de568a9e6d8e0378916f441e0f8b2b74df49b9b24094fd643413469428a537aed19b72bf9381ebab4cd57400ecad1cf1b792e9610910d02f9a779b009840e3f1a1395a87f1e590c33018be80a3f34bbaf49e415ba7d3858b40788cd19211b8cad3789870fb252f8991d64bff9558a67a2316ec2402c2f9c52de42e6389fc90bc4379f7b899b1a943035d64f20b7766edf08fdfa185d00493031f0d3f9ad7dce841f725c5adcba896a76857918a2f54c8aa2e50f71eda35b8fea3732a02c146201ad9f4b65b7caa09e2a73f72aee1ce428a35489038d5cc859fbd48be8da5d088ccab897a248fe418b89b409ab5507af725f077d264abec5b53667ca06aed03815dd537535a3360a50ca3d09c025b5057362c7cb5a4b99c58ac64fe813f4d7f2cafbc3048835ec43fa68170ec7310342134c9b5ec417763db145555cdd37f24b27b0911d172710b74d3c754aac02b24030166cbf2eccfaf1e909b629b7919db1351cd0167e8b6bddc5ce4b7e13cbf0c095f636427d440d058e7637eb117947fc6a60942d10bd455030ee38fc447fd3e6232efba65def558dcff60274e6b2ad62464b4f767bcfec22c681c12bdabf1fedc3946f45c9a34a9169f79ea60a9d190dcf1ce14957382af602dd134b610b269247f38c3d4e233f2fda399dc4cf09139cff9e9c731f8bf940df3cbdf9355f604bd0f3d3b20a6cfc39a7d9ff74f734750187b30c1a970a432bf7e9417cc87d8dea00c4e1885845e1a59bc6a5487687c5bca514e9dcf372bcdc0fe4a47f3e4ac456b1a812e69f88b2a8a964d946cc102ba6f3a7c965df24653c6384d810cf157c8581d4b40e874aded8d227a25fab9889f02698bf52980f048408de4a96226949eba5d1b7f41fce61ae1ff9388e096646ddda4c222f7b9bffc1d3e5b645b6e248637698f6a5be1dc03ff7aa9f418153beeef9b9d67ac5b6fc888e5adf0db41a6d5cac2b600af3b428a1294f4fdb4cf64ccc254c1c7ef71b9be3afceb797fc9504bc3f3dde217687d47cd445c44bea2b16eacae76f16d868b77065b189bd7c4678f3a5fc99b4d020d42972d010b7a6b22de46b434f2d8ec4f567af2d531817ec81ffa36cc27d073a66d2152f1be2a8dce08e98a00f473f22e680cf0ebdcf37936cee60f99eec69503a15d8e36f8d599b535021693fb52f9dc93e315d6e849bd4bf9d05fb25f0b09de91b73ca4edfbfa04d9262d449eab2be542ea30f316384609efc52ed641a9e32d48e4a57c65e8bfa5c13e769d5402a0b125c17360800bf0da8592a75abe647f1d9b1072942947da82e701308b60ecdcfd40d7b6cf44b443493ef0466790547c0a8e5914484969e52cba3787c41df965f91ed7074cd62a63db7e1c35b8f9ac30521295ae7b9c81143926f1dd36aefdfbcd7056b0d4209cabe113a18c58ecc062df687666725707029a8be3ef5721484bd429bab33fceb76c6a0f079da8819d0d9565f5e4ed45eb531f9501b85b619b5323169b0297b7cedcf6f288225dd5e6a7f52c1b96cd38dd94b2f6b8cfc6dbd7862901a5295dca5ecbae72344f41c4a222bd6711831d265b910d547501116bcfbf3c9e104b446175c4c8a4e56445ca22f9363f0f54858a8eb4a1c43103bca578c5b0ee372efd705a950510dbbfa4f74c8ddb4bbc1f07dd410ebb39c01f4da8a0bad2d3d35df3a12a9fa2daf44c8163d59aba8a7351ecc9fe4cd25b987dba700e73d7174307161adf70db0e7a802d7c9ec1b912ee58b0a35c2c6f40f112d70ab5aa708071379280c9ffbceaf0a4ec45c89ac0bf3ef40538302b685e24574da8bde8654e99eff66c9ad5e6beafa0e48e1c293c53d955980346cbc052d15e5d1f3baed388dfaa72ca089af06ae757466a704b93a0ff13cb5c722f0b872432a4fd4513ed56825b13ddd4d8c02eb624c8358199f52679421ab0e1792869f6b4aea523a1079b3138f1ef761c6df102096eff43ddb23ee668b9cc5161433feb318903b58387c3dae2833a8c770e7c6e27c31a1fca07377fbb07f11911be6192f7518a8d089b89826e48b28f5c8a00784bef9b2f68c90838eb2c9fcaeda4bb76782510082c977a7ecdd5743e9da8f088a3b67a25cfb25db4a709b6cbf5425e7efa8c2e472464606d9ccd2fc0f73cd1d51a5aa19d9caba10be2147f8e1ad763ba45693f9f078b0716cf588142be847ca67dc132c5782fed12b7d95c55a9bcfdfb85cb48698a45621cc2f1c85559617ece7def71486290b0cf8e987e8788e1a13f17e3f24b93ed2009ebe42e3bea9571f98b39b787c107dcada3a36fa1fe93736e74ec34af80a182cf0adf2846577f1d474c9ff1b4b8a2cfe6a2d445029ca77088b9c84be63655d48cbc5f61b18d7cda0d141f2db6bc3c479aa6ca19638e2c37da38768eb8820e5679345d2abe8033318eb952e297e17dacaaee3df7ef1d6cd554e9b1b453c44e3d4e030e25c5f9ed094100f6d9b1dc5dab371436ab252cc4d7fdf8fe4b7f36ab71f2bbe3878217b151664c3b9ae970e473ae164d77f294ca8ad58634ea446880e8327fc7af2a088e39508443a601eaa00742a7d0ad459dcac24a60edcfa6ac9f72f428c2b8dd30b8278e28f25a1a129d23cacd765de4c4aa52819578951bb8e311e8621f627e3463e2562b6dbc8d1c431c240f1424599438b9c94723f79ffd1fa1bc94104e4598bd43244302f86ddbe47ad8671e25f406aa507ba45bdba09841827a697cece002f79ec7cf14488789d754f84818d180bd04a11cb2115441a402bea2be749ef233bcd26ca27df828ada877a893e54ea3e6ea29e62d6e7693af7cbee59ccdb4045d0e6eeec3d8f59205f324a5f7cf5f871929c83ada04bc5d3990288dca5eb312339933ffb1031e05866e1b2d0aad0ca940795458b7d6c8a3750a76e1e6c8ccd48ca542d6c51164431d70c9d35f0f828cdec404a175a44bc2a9651ec5281c0f3aee9e4375f0eb139f58fa4419fddf9ebe2f8f37121a57397e7e830ac097ed375521a68f7cdc471621b769fef40cd19d8d55a82e27bf5b0cc4182359db7c9066e2ee10df279a89e96fcfea225995f065f7f286b8c8ef9b6c82a34df14dda2f737f557578ce5b15944e3149110102d80465c1b436b6bbb16fdc64a9d130ec7644bc162f0e2c5669a9254970a062561e269d85b72b4748d71d88ca20778287bc3b9613043166862f133f366f6361b9e1d040bbcd9728a70fcf3be7ea8fe0f55980ed03f336ec49f7cb6899813acf47d3b2413e7b637b764fcb9003ece75f8a255b9cdc71f80dbbaa7eaa2111b5551feeb7ea31620a2c88897538915abedcd184d57c79d81505985f561820449c330bc3412bffb68c4c743c5a5a3acafcf00d7561a66f70e5835da530ba62f221211e1fefdc1fbc8c05b1b68b7eb2afac6ebbbc0b961b8ef8b27b555ce7641f6601ac19d5f4adb06b40155a2085ff32de5b2c5edd96a01a14d1bb49b58f1fd718bec428043819b8070e46f0215d2153318320754638d9b40a5214784e7c1f80dde05500cfe8e4dff855504e099634fb3d44829453cf4ac8db7e5a4144f96d4508de90ada04240637fd5b261cfbb80c8d9ccdea6c1d3485a85663cff9749133002c7f9c6ea4de1b50fe90dae397f6b5833e943e6c5f60e10d805e97e6869488b857b44d8c94276f668257c223e2e26dff75222d3f304f8a040ce058e1b7b3bc5f0b69c310beea64212ef0a54bc9fb858c25681cee574c532b64d4f8241e0b855f7f79d0a1ea22fc3d9ad5a1658b5c4d9d417e9eae47c81628341172609a8ef8c72fb6e4e48da6a10207e56b727f65c82d49e2dbb44b492e1265c2b28f98980334ccc3abb0cfd15d73c2f38f4c824022aa7a0ac0b7d35eea934d3455d21e8c710474e54bdf29be107ebc00", 0xffffffffffffff5a}, 0x1006) dup3(0xffffffffffffffff, r2, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000180)) r3 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x10000, 0x0, 0x0, 0x0, 0x2}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unshare(0x40000000) 23:57:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x0, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:31 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000000f000000000200000000", 0x58}], 0x1) 23:57:31 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x8000003b, 0x0) 23:57:31 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, 0x0, 0x0, 0x0) [ 680.693735] net_ratelimit: 2 callbacks suppressed [ 680.693744] protocol 88fb is buggy, dev hsr_slave_0 [ 680.693995] selinux_nlmsg_perm: 65 callbacks suppressed [ 680.694008] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 [ 680.698725] protocol 88fb is buggy, dev hsr_slave_1 [ 680.723737] protocol 88fb is buggy, dev hsr_slave_0 [ 680.726547] protocol 88fb is buggy, dev hsr_slave_0 [ 680.731471] protocol 88fb is buggy, dev hsr_slave_1 [ 680.736487] protocol 88fb is buggy, dev hsr_slave_1 [ 680.753004] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 23:57:31 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000060000000000200000000", 0x58}], 0x1) [ 680.803739] protocol 88fb is buggy, dev hsr_slave_0 [ 680.808910] protocol 88fb is buggy, dev hsr_slave_1 [ 680.833737] protocol 88fb is buggy, dev hsr_slave_0 [ 680.838989] protocol 88fb is buggy, dev hsr_slave_1 [ 680.844763] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 [ 680.924820] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 [ 681.020017] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 23:57:31 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mprotect(&(0x7f0000315000/0x2000)=nil, 0x2000, 0x2000001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee006b6b6b000000000200000000", 0x58}], 0x1) [ 681.130509] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 [ 681.171040] IPVS: ftp: loaded support on port[0] = 21 [ 681.224117] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 [ 681.264733] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 23:57:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7eeffffff9e000000000200000000", 0x58}], 0x1) 23:57:31 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/\x00'/33, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 681.307384] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 [ 681.336632] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13596 comm=syz-executor.4 [ 681.680711] IPVS: ftp: loaded support on port[0] = 21 23:57:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000df000000000200000000", 0x58}], 0x1) [ 683.254784] device bridge_slave_1 left promiscuous mode [ 683.260327] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.314689] device bridge_slave_0 left promiscuous mode [ 683.320212] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.447592] device hsr_slave_1 left promiscuous mode [ 683.488743] device hsr_slave_0 left promiscuous mode [ 683.548317] team0 (unregistering): Port device team_slave_1 removed [ 683.559587] team0 (unregistering): Port device team_slave_0 removed [ 683.571837] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 683.618396] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 683.706749] bond0 (unregistering): Released all slaves [ 683.751360] IPVS: ftp: loaded support on port[0] = 21 [ 683.819747] chnl_net:caif_netlink_parms(): no params data found [ 683.859326] bridge0: port 1(bridge_slave_0) entered blocking state [ 683.866414] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.873471] device bridge_slave_0 entered promiscuous mode [ 683.880647] bridge0: port 2(bridge_slave_1) entered blocking state [ 683.887144] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.894496] device bridge_slave_1 entered promiscuous mode [ 683.913779] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 683.923157] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 683.941273] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 683.949040] team0: Port device team_slave_0 added [ 683.955185] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 683.962423] team0: Port device team_slave_1 added [ 683.969163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 683.976662] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 684.035905] device hsr_slave_0 entered promiscuous mode [ 684.073968] device hsr_slave_1 entered promiscuous mode [ 684.114342] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 684.121314] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 684.221304] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.227745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.234505] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.240857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.344722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 684.369316] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 684.390522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 684.406926] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.414661] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.430410] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 684.437172] 8021q: adding VLAN 0 to HW filter on device team0 [ 684.451259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 684.460798] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.467315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.485431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 684.493224] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.499707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.521849] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 684.531973] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 684.542792] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 684.551310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 684.560041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 684.568467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 684.577102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 684.592076] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 684.600045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 684.607913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 684.631571] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 684.640275] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 684.648050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:57:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x0, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:35 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, 0x0, 0x0, 0x0) 23:57:35 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000063, 0x0) 23:57:35 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0xfffffffc}}, 0x1c) listen(r0, 0x1d7) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x801, 0x84) r2 = socket$inet(0xa, 0x80805, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) write(r6, &(0x7f0000000340)="061e173be37259bd903f60b021e16f0d0310deabc45d153de18c0ef82edd197754aff64b8a7943cd3709ad9046fe73466051890b553de96813b15946d0893adf3c885a70d5b5f54b3d38860c731c2a5a7e36bde655402a66703661c964", 0x5d) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xf, &(0x7f00000000c0)={r8, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={r7, 0x2, 0x2, 0x3ff}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000002c0)={r9, 0x8}, &(0x7f0000000300)=0x8) bind$rxrpc(r5, &(0x7f00000003c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}}, 0x24) r10 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x41e, 0x4081) write$FUSE_NOTIFY_POLL(r10, &(0x7f0000000440)={0x18, 0x1, 0x0, {0xa3c}}, 0x18) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={r8, 0x8, 0x9, 0x5}, 0x10) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) 23:57:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7eefffffff0000000000200000000", 0x58}], 0x1) 23:57:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00f0ffff000000000200000000", 0x58}], 0x1) 23:57:35 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x8000008a, 0x0) 23:57:35 executing program 3: mkdir(0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x0, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee9effffff000000000200000000", 0x58}], 0x1) 23:57:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7eef0ffffff000000000200000000", 0x58}], 0x1) 23:57:36 executing program 3: mkdir(0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:36 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000364, 0x0) [ 685.714553] selinux_nlmsg_perm: 66 callbacks suppressed [ 685.714628] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.754123] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.769326] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.783856] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.797003] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.810079] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.823579] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.845541] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.861328] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 [ 685.874219] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13675 comm=syz-executor.4 23:57:36 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 23:57:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000340000200000000", 0x58}], 0x1) 23:57:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x0, 0x0, 0x0, 0xcc17}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:36 executing program 3: mkdir(0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:36 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000600, 0x0) 23:57:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000006b6b6b000200000000", 0x58}], 0x1) 23:57:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7eefffffffffffff0000200000000", 0x58}], 0x1) 23:57:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 686.333832] net_ratelimit: 12 callbacks suppressed [ 686.333840] protocol 88fb is buggy, dev hsr_slave_0 [ 686.345823] protocol 88fb is buggy, dev hsr_slave_1 23:57:37 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x2) 23:57:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000010200000000", 0x58}], 0x1) 23:57:37 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) [ 688.382455] IPVS: ftp: loaded support on port[0] = 21 [ 688.747259] chnl_net:caif_netlink_parms(): no params data found [ 688.924127] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.930526] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.937701] device bridge_slave_0 entered promiscuous mode [ 688.945308] bridge0: port 2(bridge_slave_1) entered blocking state [ 688.951739] bridge0: port 2(bridge_slave_1) entered disabled state [ 688.959476] device bridge_slave_1 entered promiscuous mode [ 688.976972] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 689.129530] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 689.155150] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 689.162490] team0: Port device team_slave_0 added [ 689.168238] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 689.175897] team0: Port device team_slave_1 added [ 689.181355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 689.189237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 689.366093] device hsr_slave_0 entered promiscuous mode [ 689.399276] device hsr_slave_1 entered promiscuous mode [ 689.444397] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 689.451459] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 689.460257] device bridge_slave_1 left promiscuous mode [ 689.466325] bridge0: port 2(bridge_slave_1) entered disabled state [ 689.504405] device bridge_slave_0 left promiscuous mode [ 689.509879] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.575579] device bridge_slave_1 left promiscuous mode [ 689.581061] bridge0: port 2(bridge_slave_1) entered disabled state [ 689.634741] device bridge_slave_0 left promiscuous mode [ 689.640274] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.009448] device hsr_slave_1 left promiscuous mode [ 693.058302] device hsr_slave_0 left promiscuous mode [ 693.107410] team0 (unregistering): Port device team_slave_1 removed [ 693.120906] team0 (unregistering): Port device team_slave_0 removed [ 693.131497] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 693.188164] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 693.290213] bond0 (unregistering): Released all slaves [ 693.386744] device hsr_slave_1 left promiscuous mode [ 693.428716] device hsr_slave_0 left promiscuous mode [ 693.478305] team0 (unregistering): Port device team_slave_1 removed [ 693.490730] team0 (unregistering): Port device team_slave_0 removed [ 693.501066] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 693.539134] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 693.615769] bond0 (unregistering): Released all slaves [ 693.652570] bridge0: port 2(bridge_slave_1) entered blocking state [ 693.658964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 693.665649] bridge0: port 1(bridge_slave_0) entered blocking state [ 693.672000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 693.680638] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.688150] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.726327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 693.735314] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 693.746377] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 693.752635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 693.760192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 693.770913] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 693.777342] 8021q: adding VLAN 0 to HW filter on device team0 [ 693.792576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 693.799747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 693.807853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 693.816139] bridge0: port 1(bridge_slave_0) entered blocking state [ 693.822492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 693.832022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 693.839370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 693.847433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 693.856266] bridge0: port 2(bridge_slave_1) entered blocking state [ 693.862625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 693.871772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 693.882096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 693.889517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 693.890279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 693.909892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 693.917417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 693.925839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 693.934279] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 693.945253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 693.952728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 693.961017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 693.970719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 693.977829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 693.986113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 693.996646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 694.004289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 694.011834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 694.026895] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 694.033094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 694.140788] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 694.149688] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 694.156653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 694.163406] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 694.176514] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 694.363802] protocol 88fb is buggy, dev hsr_slave_0 [ 694.368940] protocol 88fb is buggy, dev hsr_slave_1 23:57:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000400000008000300000000000840440000000000080002000000000018000400000000000000000000000000000000009901000010"], 0x3}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 23:57:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:45 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x3) 23:57:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000020200000000", 0x58}], 0x1) 23:57:45 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) [ 694.598042] selinux_nlmsg_perm: 81 callbacks suppressed [ 694.598057] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 23:57:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 23:57:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000040200000000", 0x58}], 0x1) [ 694.643743] protocol 88fb is buggy, dev hsr_slave_0 [ 694.649000] protocol 88fb is buggy, dev hsr_slave_1 [ 694.684834] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 23:57:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 694.739538] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 [ 694.764131] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 23:57:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000000000000a0200000000", 0x58}], 0x1) 23:57:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) [ 694.799702] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 [ 694.919759] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 23:57:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 23:57:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000000000000e0200000000", 0x58}], 0x1) [ 695.043751] protocol 88fb is buggy, dev hsr_slave_0 [ 695.049051] protocol 88fb is buggy, dev hsr_slave_1 [ 695.084442] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 [ 695.162026] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 [ 695.221029] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 [ 695.254276] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13743 comm=syz-executor.4 [ 695.283769] protocol 88fb is buggy, dev hsr_slave_0 [ 695.283799] protocol 88fb is buggy, dev hsr_slave_0 [ 695.288853] protocol 88fb is buggy, dev hsr_slave_1 [ 695.299243] protocol 88fb is buggy, dev hsr_slave_1 [ 696.924760] device bridge_slave_1 left promiscuous mode [ 696.930293] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.984784] device bridge_slave_0 left promiscuous mode [ 696.990275] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.109690] device hsr_slave_1 left promiscuous mode [ 697.156578] device hsr_slave_0 left promiscuous mode [ 697.216902] team0 (unregistering): Port device team_slave_1 removed [ 697.230561] team0 (unregistering): Port device team_slave_0 removed [ 697.242126] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 697.278984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 697.358708] bond0 (unregistering): Released all slaves [ 697.390963] IPVS: ftp: loaded support on port[0] = 21 [ 697.473469] chnl_net:caif_netlink_parms(): no params data found [ 697.516301] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.522751] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.529827] device bridge_slave_0 entered promiscuous mode [ 697.593931] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.600297] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.614810] device bridge_slave_1 entered promiscuous mode [ 697.646026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 697.656893] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 697.690755] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 697.699103] team0: Port device team_slave_0 added [ 697.711214] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 697.719441] team0: Port device team_slave_1 added [ 697.731033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 697.738828] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 697.832609] device hsr_slave_0 entered promiscuous mode [ 697.874153] device hsr_slave_1 entered promiscuous mode [ 697.924419] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 697.931388] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 697.972348] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.978859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 697.985620] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.992026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.061505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 698.073246] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 698.091777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 698.103480] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.118342] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.135467] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 698.141546] 8021q: adding VLAN 0 to HW filter on device team0 [ 698.156311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 698.165256] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.171696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.188062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 698.196245] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.202767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 698.226100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 698.234864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 698.243172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 698.251230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 698.262447] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 698.269374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 698.277536] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 698.303398] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 698.312828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 698.321621] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 698.340569] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 698.447055] netlink: 389 bytes leftover after parsing attributes in process `syz-executor.2'. 23:57:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x100000003, 0x3a) r4 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r4, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) close(r3) 23:57:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000000000000f0200000000", 0x58}], 0x1) 23:57:49 executing program 1 (fault-call:5 fault-nth:0): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:49 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x4) 23:57:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 699.241964] FAULT_INJECTION: forcing a failure. [ 699.241964] name failslab, interval 1, probability 0, space 0, times 0 [ 699.321900] CPU: 1 PID: 13780 Comm: syz-executor.1 Not tainted 4.19.83 #0 [ 699.328880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.338251] Call Trace: [ 699.340863] dump_stack+0x172/0x1f0 [ 699.344512] should_fail.cold+0xa/0x1b [ 699.348415] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.353536] ? lock_downgrade+0x880/0x880 [ 699.357703] __should_failslab+0x121/0x190 [ 699.361949] should_failslab+0x9/0x14 [ 699.365753] __kmalloc+0x2e2/0x750 [ 699.369374] ? get_pid_task+0xd4/0x190 [ 699.373324] ? rw_copy_check_uvector+0x28c/0x330 [ 699.378088] rw_copy_check_uvector+0x28c/0x330 [ 699.382662] ? kasan_check_read+0x11/0x20 [ 699.386877] import_iovec+0xc2/0x3e0 [ 699.386893] ? dup_iter+0x270/0x270 [ 699.386907] ? __fget+0x340/0x540 [ 699.386922] vfs_readv+0xc6/0x160 [ 699.386935] ? compat_rw_copy_check_uvector+0x400/0x400 [ 699.386946] ? kasan_check_read+0x11/0x20 [ 699.386960] ? __fget+0x367/0x540 [ 699.386974] ? iterate_fd+0x360/0x360 23:57:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:49 executing program 2: [ 699.387004] ? check_preemption_disabled+0x48/0x290 [ 699.387020] ? wait_for_completion+0x440/0x440 [ 699.394553] ? __fget_light+0x1a9/0x230 [ 699.394574] do_readv+0x15e/0x370 [ 699.394589] ? vfs_readv+0x160/0x160 [ 699.394611] ? do_syscall_64+0x26/0x620 [ 699.394625] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.394640] ? do_syscall_64+0x26/0x620 [ 699.452186] __x64_sys_readv+0x75/0xb0 [ 699.456084] do_syscall_64+0xfd/0x620 [ 699.459892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.465087] RIP: 0033:0x45a219 [ 699.468288] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.487197] RSP: 002b:00007f0a69e2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 699.494916] RAX: ffffffffffffffda RBX: 00007f0a69e2fc90 RCX: 000000000045a219 [ 699.502192] RDX: 20000000000001c1 RSI: 0000000020000040 RDI: 0000000000000003 [ 699.509471] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:57:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000600200000000", 0x58}], 0x1) [ 699.516743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a69e306d4 [ 699.524014] R13: 00000000004c7aa2 R14: 00000000004ddd20 R15: 0000000000000004 23:57:50 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x5) 23:57:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000ffffff9e0200000000", 0x58}], 0x1) 23:57:50 executing program 2: [ 699.752088] selinux_nlmsg_perm: 35 callbacks suppressed [ 699.752102] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 699.770026] protocol 88fb is buggy, dev hsr_slave_0 [ 699.775127] protocol 88fb is buggy, dev hsr_slave_1 [ 699.874504] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 699.911595] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 699.940537] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 699.973439] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 700.021132] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 700.058473] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 700.091640] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 700.124048] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 700.148445] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13810 comm=syz-executor.4 [ 701.331654] IPVS: ftp: loaded support on port[0] = 21 [ 701.401212] chnl_net:caif_netlink_parms(): no params data found [ 701.441745] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.449673] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.456834] device bridge_slave_0 entered promiscuous mode [ 701.463967] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.470372] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.477780] device bridge_slave_1 entered promiscuous mode [ 701.484703] device bridge_slave_1 left promiscuous mode [ 701.490160] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.534731] device bridge_slave_0 left promiscuous mode [ 701.540192] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.656581] device hsr_slave_1 left promiscuous mode [ 701.717422] device hsr_slave_0 left promiscuous mode [ 701.789610] team0 (unregistering): Port device team_slave_1 removed [ 701.801431] team0 (unregistering): Port device team_slave_0 removed [ 701.812945] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 701.858044] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 701.932760] bond0 (unregistering): Released all slaves [ 701.998723] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 702.008418] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 702.027479] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 702.035084] team0: Port device team_slave_0 added [ 702.040628] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 702.048206] team0: Port device team_slave_1 added [ 702.053534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 702.060920] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 702.115897] device hsr_slave_0 entered promiscuous mode [ 702.173985] device hsr_slave_1 entered promiscuous mode [ 702.224338] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 702.231280] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 702.252107] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.258555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 702.265253] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.271628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.347100] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 702.353210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 702.364354] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 702.375630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 702.383416] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.390966] bridge0: port 2(bridge_slave_1) entered disabled state [ 702.399003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 702.411299] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 702.419501] 8021q: adding VLAN 0 to HW filter on device team0 [ 702.431993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 702.439597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 702.448567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 702.457272] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.463624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.473137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 702.482022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 702.491172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 702.499188] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.505586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 702.516358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 702.524671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 702.537441] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 702.544930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 702.557989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 702.565445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 702.573436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 702.586317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 702.594714] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 702.601952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 702.610498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 702.620094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 702.627511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 702.639779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 702.652051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 702.663584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 702.677804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 702.689745] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 702.700201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 702.722506] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 702.732462] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 702.748577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 702.757224] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 702.773467] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 702.925379] protocol 88fb is buggy, dev hsr_slave_0 [ 702.930898] protocol 88fb is buggy, dev hsr_slave_1 [ 702.963802] protocol 88fb is buggy, dev hsr_slave_0 [ 702.968941] protocol 88fb is buggy, dev hsr_slave_1 [ 703.043996] protocol 88fb is buggy, dev hsr_slave_0 [ 703.049116] protocol 88fb is buggy, dev hsr_slave_1 23:57:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:53 executing program 1 (fault-call:5 fault-nth:1): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000df0200000000", 0x58}], 0x1) 23:57:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:53 executing program 2: 23:57:53 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x6) 23:57:53 executing program 2: 23:57:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000fffffff00200000000", 0x58}], 0x1) [ 703.281214] FAULT_INJECTION: forcing a failure. [ 703.281214] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 703.347990] CPU: 1 PID: 13834 Comm: syz-executor.1 Not tainted 4.19.83 #0 [ 703.354962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.364321] Call Trace: [ 703.366944] dump_stack+0x172/0x1f0 [ 703.370603] should_fail.cold+0xa/0x1b [ 703.374514] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 703.379656] __alloc_pages_nodemask+0x1ee/0x750 [ 703.384345] ? __alloc_pages_slowpath+0x2870/0x2870 [ 703.389383] ? mark_held_locks+0x100/0x100 [ 703.393696] ? unwind_get_return_address+0x61/0xa0 [ 703.398643] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 703.404190] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 703.409747] alloc_pages_vma+0x3b6/0x590 [ 703.413837] do_huge_pmd_anonymous_page+0x518/0x14e0 [ 703.418962] ? __thp_get_unmapped_area+0x190/0x190 [ 703.423915] ? pmd_val+0x100/0x100 [ 703.427475] __handle_mm_fault+0x2c80/0x3f80 [ 703.431903] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 703.436774] ? count_memcg_event_mm+0x2b1/0x4d0 [ 703.441453] handle_mm_fault+0x1b5/0x690 [ 703.445529] __do_page_fault+0x62a/0xe90 [ 703.449604] ? vmalloc_fault+0x740/0x740 [ 703.453675] ? trace_hardirqs_off_caller+0x65/0x220 [ 703.458706] do_page_fault+0x71/0x57d [ 703.462519] page_fault+0x1e/0x30 [ 703.465986] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 703.471879] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 703.490900] RSP: 0018:ffff88803cfd78a0 EFLAGS: 00010202 [ 703.496271] RAX: ffffed10079faf32 RBX: 0000000000000080 RCX: 0000000000000080 [ 703.503544] RDX: 0000000000000080 RSI: ffff88803cfd7910 RDI: 0000000020fc7000 [ 703.510821] RBP: ffff88803cfd78d8 R08: 1ffff110079faf22 R09: ffffed10079faf32 [ 703.518095] R10: ffffed10079faf31 R11: ffff88803cfd798f R12: 0000000020fc7000 [ 703.525364] R13: ffff88803cfd7910 R14: 0000000020fc7080 R15: 00007ffffffff000 [ 703.532663] ? _copy_to_user+0xf7/0x120 [ 703.536715] signalfd_copyinfo+0x25c/0x770 [ 703.540961] ? signalfd_poll+0x220/0x220 [ 703.545038] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 703.550144] ? remove_wait_queue+0x10f/0x190 [ 703.554556] signalfd_read+0x35a/0x6f0 [ 703.558456] ? signalfd_copyinfo+0x770/0x770 [ 703.562870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.568415] ? wake_up_q+0x100/0x100 [ 703.572205] ? rw_verify_area+0x118/0x360 [ 703.576359] do_iter_read+0x490/0x640 [ 703.580164] ? dup_iter+0x270/0x270 [ 703.583803] vfs_readv+0xf0/0x160 [ 703.587257] ? compat_rw_copy_check_uvector+0x400/0x400 [ 703.592621] ? kasan_check_read+0x11/0x20 [ 703.596782] ? iterate_fd+0x360/0x360 [ 703.600680] ? check_preemption_disabled+0x48/0x290 [ 703.605700] ? wait_for_completion+0x440/0x440 [ 703.610288] ? __fget_light+0x1a9/0x230 [ 703.614270] do_readv+0x15e/0x370 [ 703.617733] ? vfs_readv+0x160/0x160 [ 703.621455] ? do_syscall_64+0x26/0x620 [ 703.625439] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.630799] ? do_syscall_64+0x26/0x620 [ 703.634781] __x64_sys_readv+0x75/0xb0 [ 703.638674] do_syscall_64+0xfd/0x620 [ 703.642483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.647670] RIP: 0033:0x45a219 [ 703.650864] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.669766] RSP: 002b:00007f0a69e2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 703.677587] RAX: ffffffffffffffda RBX: 00007f0a69e2fc90 RCX: 000000000045a219 [ 703.684865] RDX: 20000000000001c1 RSI: 0000000020000040 RDI: 0000000000000003 [ 703.692138] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:57:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00f0ffffffffffff0200000000", 0x58}], 0x1) 23:57:54 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x7) 23:57:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) [ 703.699408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a69e306d4 [ 703.706681] R13: 00000000004c7aa2 R14: 00000000004ddd20 R15: 0000000000000004 23:57:54 executing program 1 (fault-call:5 fault-nth:2): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:54 executing program 2: 23:57:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000100000000", 0x58}], 0x1) 23:57:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f00000000c0)={'sit0\x00', @ifru_flags}) 23:57:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00020000000000000200000000", 0x58}], 0x1) 23:57:54 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xa) 23:57:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 704.072984] FAULT_INJECTION: forcing a failure. [ 704.072984] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.146400] CPU: 1 PID: 13865 Comm: syz-executor.1 Not tainted 4.19.83 #0 [ 704.153402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.162770] Call Trace: [ 704.166430] dump_stack+0x172/0x1f0 [ 704.170087] should_fail.cold+0xa/0x1b [ 704.173996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 704.179133] ? __might_sleep+0x95/0x190 [ 704.183124] __alloc_pages_nodemask+0x1ee/0x750 [ 704.187805] ? mem_cgroup_throttle_swaprate+0x196/0x66e 23:57:54 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x31428f95) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 704.193185] ? __alloc_pages_slowpath+0x2870/0x2870 [ 704.198215] ? kasan_check_read+0x11/0x20 [ 704.202376] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 704.207937] alloc_pages_current+0x107/0x210 [ 704.212360] pte_alloc_one+0x1b/0x1a0 [ 704.216175] do_huge_pmd_anonymous_page+0x712/0x14e0 [ 704.221297] ? __thp_get_unmapped_area+0x190/0x190 [ 704.226247] __handle_mm_fault+0x2c80/0x3f80 [ 704.230669] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 704.235542] ? count_memcg_event_mm+0x2b1/0x4d0 [ 704.240225] handle_mm_fault+0x1b5/0x690 23:57:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 704.244303] __do_page_fault+0x62a/0xe90 [ 704.248384] ? vmalloc_fault+0x740/0x740 [ 704.252456] ? trace_hardirqs_off_caller+0x65/0x220 [ 704.257576] do_page_fault+0x71/0x57d [ 704.261390] page_fault+0x1e/0x30 [ 704.264858] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 704.270752] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 704.289667] RSP: 0018:ffff8880a7cbf8a0 EFLAGS: 00010202 [ 704.295048] RAX: ffffed1014f97f32 RBX: 0000000000000080 RCX: 0000000000000080 [ 704.302341] RDX: 0000000000000080 RSI: ffff8880a7cbf910 RDI: 0000000020fc7000 [ 704.309621] RBP: ffff8880a7cbf8d8 R08: 1ffff11014f97f22 R09: ffffed1014f97f32 [ 704.316906] R10: ffffed1014f97f31 R11: ffff8880a7cbf98f R12: 0000000020fc7000 [ 704.324187] R13: ffff8880a7cbf910 R14: 0000000020fc7080 R15: 00007ffffffff000 [ 704.331493] ? _copy_to_user+0xf7/0x120 [ 704.335484] signalfd_copyinfo+0x25c/0x770 [ 704.339731] ? signalfd_poll+0x220/0x220 [ 704.343835] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 704.348950] ? remove_wait_queue+0x10f/0x190 [ 704.353373] signalfd_read+0x35a/0x6f0 [ 704.357282] ? signalfd_copyinfo+0x770/0x770 [ 704.361704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.367261] ? wake_up_q+0x100/0x100 [ 704.371013] ? rw_verify_area+0x118/0x360 [ 704.375173] do_iter_read+0x490/0x640 [ 704.378978] ? dup_iter+0x270/0x270 [ 704.382626] vfs_readv+0xf0/0x160 [ 704.386087] ? compat_rw_copy_check_uvector+0x400/0x400 [ 704.391454] ? kasan_check_read+0x11/0x20 23:57:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 704.395626] ? iterate_fd+0x360/0x360 [ 704.399443] ? check_preemption_disabled+0x48/0x290 [ 704.404469] ? wait_for_completion+0x440/0x440 [ 704.409064] ? __fget_light+0x1a9/0x230 [ 704.413051] do_readv+0x15e/0x370 [ 704.416513] ? vfs_readv+0x160/0x160 [ 704.420237] ? do_syscall_64+0x26/0x620 [ 704.424219] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.429590] ? do_syscall_64+0x26/0x620 [ 704.433575] __x64_sys_readv+0x75/0xb0 [ 704.437472] do_syscall_64+0xfd/0x620 [ 704.441290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.446487] RIP: 0033:0x45a219 [ 704.449695] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.468606] RSP: 002b:00007f0a69e2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 704.476333] RAX: ffffffffffffffda RBX: 00007f0a69e2fc90 RCX: 000000000045a219 [ 704.483617] RDX: 20000000000001c1 RSI: 0000000020000040 RDI: 0000000000000003 [ 704.490894] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 704.498169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a69e306d4 [ 704.505445] R13: 00000000004c7aa2 R14: 00000000004ddd20 R15: 0000000000000004 23:57:55 executing program 1 (fault-call:5 fault-nth:3): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00040000000000000200000000", 0x58}], 0x1) 23:57:55 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xe) [ 704.799164] selinux_nlmsg_perm: 112 callbacks suppressed [ 704.799182] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 704.818300] FAULT_INJECTION: forcing a failure. [ 704.818300] name failslab, interval 1, probability 0, space 0, times 0 [ 704.880679] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 704.890726] CPU: 0 PID: 13897 Comm: syz-executor.1 Not tainted 4.19.83 #0 [ 704.899914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.904134] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 704.909447] Call Trace: [ 704.909476] dump_stack+0x172/0x1f0 [ 704.909504] should_fail.cold+0xa/0x1b [ 704.931822] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 704.936941] ? lock_downgrade+0x880/0x880 [ 704.941106] __should_failslab+0x121/0x190 [ 704.942444] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 704.945343] should_failslab+0x9/0x14 [ 704.945358] kmem_cache_alloc+0x2ae/0x700 [ 704.945373] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 704.945391] ptlock_alloc+0x20/0x70 [ 704.945406] pte_alloc_one+0x6d/0x1a0 [ 704.945424] do_huge_pmd_anonymous_page+0x712/0x14e0 [ 704.984538] ? __thp_get_unmapped_area+0x190/0x190 [ 704.988343] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 704.989482] __handle_mm_fault+0x2c80/0x3f80 [ 704.989500] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 705.010958] ? count_memcg_event_mm+0x2b1/0x4d0 [ 705.015633] handle_mm_fault+0x1b5/0x690 [ 705.019706] __do_page_fault+0x62a/0xe90 [ 705.023800] ? vmalloc_fault+0x740/0x740 [ 705.027864] ? trace_hardirqs_off_caller+0x65/0x220 [ 705.032408] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 705.032883] do_page_fault+0x71/0x57d [ 705.048891] page_fault+0x1e/0x30 [ 705.052348] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 705.058233] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 705.077136] RSP: 0018:ffff8880873578a0 EFLAGS: 00010202 [ 705.082507] RAX: ffffed1010e6af32 RBX: 0000000000000080 RCX: 0000000000000080 [ 705.089783] RDX: 0000000000000080 RSI: ffff888087357910 RDI: 0000000020fc7000 [ 705.093962] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 705.097050] RBP: ffff8880873578d8 R08: 1ffff11010e6af22 R09: ffffed1010e6af32 [ 705.097060] R10: ffffed1010e6af31 R11: ffff88808735798f R12: 0000000020fc7000 [ 705.097069] R13: ffff888087357910 R14: 0000000020fc7080 R15: 00007ffffffff000 [ 705.097102] ? _copy_to_user+0xf7/0x120 [ 705.135062] signalfd_copyinfo+0x25c/0x770 [ 705.139306] ? signalfd_poll+0x220/0x220 [ 705.143391] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 705.148507] ? remove_wait_queue+0x10f/0x190 [ 705.152932] signalfd_read+0x35a/0x6f0 [ 705.156843] ? signalfd_copyinfo+0x770/0x770 [ 705.161287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.166842] ? wake_up_q+0x100/0x100 [ 705.170392] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 705.170584] ? rw_verify_area+0x118/0x360 [ 705.186934] do_iter_read+0x490/0x640 [ 705.190747] ? dup_iter+0x270/0x270 [ 705.194392] vfs_readv+0xf0/0x160 [ 705.198027] ? compat_rw_copy_check_uvector+0x400/0x400 [ 705.203399] ? kasan_check_read+0x11/0x20 [ 705.203736] protocol 88fb is buggy, dev hsr_slave_0 [ 705.207555] ? iterate_fd+0x360/0x360 [ 705.212593] protocol 88fb is buggy, dev hsr_slave_1 [ 705.216339] ? check_preemption_disabled+0x48/0x290 [ 705.216357] ? wait_for_completion+0x440/0x440 [ 705.216375] ? __fget_light+0x1a9/0x230 [ 705.216393] do_readv+0x15e/0x370 [ 705.238392] ? vfs_readv+0x160/0x160 [ 705.242121] ? do_syscall_64+0x26/0x620 [ 705.246107] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.251483] ? do_syscall_64+0x26/0x620 [ 705.255462] __x64_sys_readv+0x75/0xb0 [ 705.259368] do_syscall_64+0xfd/0x620 [ 705.263160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.268506] RIP: 0033:0x45a219 [ 705.271683] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 705.291091] RSP: 002b:00007f0a69e2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 705.298792] RAX: ffffffffffffffda RBX: 00007f0a69e2fc90 RCX: 000000000045a219 [ 705.306047] RDX: 20000000000001c1 RSI: 0000000020000040 RDI: 0000000000000003 [ 705.313302] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 705.320559] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a69e306d4 [ 705.327815] R13: 00000000004c7aa2 R14: 00000000004ddd20 R15: 0000000000000004 [ 705.337287] protocol 88fb is buggy, dev hsr_slave_0 [ 705.339730] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 705.344324] protocol 88fb is buggy, dev hsr_slave_1 [ 705.359846] protocol 88fb is buggy, dev hsr_slave_0 [ 705.365244] protocol 88fb is buggy, dev hsr_slave_1 [ 705.407951] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=13899 comm=syz-executor.4 [ 706.264352] device bridge_slave_1 left promiscuous mode [ 706.269837] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.334648] device bridge_slave_0 left promiscuous mode [ 706.340177] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.486520] device hsr_slave_1 left promiscuous mode [ 706.526702] device hsr_slave_0 left promiscuous mode [ 706.578376] team0 (unregistering): Port device team_slave_1 removed [ 706.589033] team0 (unregistering): Port device team_slave_0 removed [ 706.600311] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 706.647481] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 706.762541] bond0 (unregistering): Released all slaves [ 706.832962] IPVS: ftp: loaded support on port[0] = 21 [ 706.899678] chnl_net:caif_netlink_parms(): no params data found [ 706.933923] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.940368] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.947643] device bridge_slave_0 entered promiscuous mode [ 706.954904] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.961320] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.968436] device bridge_slave_1 entered promiscuous mode [ 706.988706] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 706.999492] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 707.016546] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 707.024079] team0: Port device team_slave_0 added [ 707.029585] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 707.037031] team0: Port device team_slave_1 added [ 707.042263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 707.049866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 707.189168] device hsr_slave_0 entered promiscuous mode [ 707.264184] device hsr_slave_1 entered promiscuous mode [ 707.354519] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 707.361508] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 707.399650] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.406152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.412797] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.419189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.528265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 707.540865] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 707.553380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 707.562715] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.569938] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.589834] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 707.596527] 8021q: adding VLAN 0 to HW filter on device team0 [ 707.611105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 707.622315] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.628848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.647303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 707.655783] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.662224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.681533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 707.690790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 707.708620] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 707.716524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 707.724543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 707.734554] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 707.740613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 707.764462] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 707.773396] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 707.785530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 707.797263] 8021q: adding VLAN 0 to HW filter on device batadv0 23:57:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x0, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000a0000000000000200000000", 0x58}], 0x1) 23:57:58 executing program 1 (fault-call:5 fault-nth:4): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f00000000c0)={'sit0\x00', @ifru_flags}) 23:57:58 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xf) 23:57:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89fa, &(0x7f00000000c0)={'sit0\x00', @ifru_flags}) 23:57:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000e0000000000000200000000", 0x58}], 0x1) 23:57:58 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x0, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:58 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x12) 23:57:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = dup2(r2, r1) r4 = fcntl$dupfd(r3, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) unshare(0x8000400) splice(r0, 0x0, r5, &(0x7f00000002c0), 0x5, 0x0) 23:57:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000f0000000000000200000000", 0x58}], 0x1) 23:57:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x0, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:57:59 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x13) 23:57:59 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x18e}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00600000000000000200000000", 0x58}], 0x1) 23:57:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:59 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x1c1}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:57:59 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x14) 23:57:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00df0000000000000200000000", 0x58}], 0x1) 23:57:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:57:59 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x20fc7080}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 709.274950] device bridge_slave_1 left promiscuous mode [ 709.280484] bridge0: port 2(bridge_slave_1) entered disabled state [ 709.334661] device bridge_slave_0 left promiscuous mode [ 709.341353] bridge0: port 1(bridge_slave_0) entered disabled state [ 709.516756] device hsr_slave_1 left promiscuous mode [ 709.558119] device hsr_slave_0 left promiscuous mode [ 709.617760] team0 (unregistering): Port device team_slave_1 removed [ 709.642447] team0 (unregistering): Port device team_slave_0 removed [ 709.657160] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 709.710357] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 709.791318] bond0 (unregistering): Released all slaves 23:58:01 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x15) 23:58:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00f00000000000000200000000", 0x58}], 0x1) [ 711.000360] IPVS: ftp: loaded support on port[0] = 21 [ 711.155816] chnl_net:caif_netlink_parms(): no params data found [ 711.192122] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.199463] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.208329] device bridge_slave_0 entered promiscuous mode [ 711.215848] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.222245] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.230901] device bridge_slave_1 entered promiscuous mode [ 711.247741] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 711.256765] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 711.273498] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 711.281072] team0: Port device team_slave_0 added [ 711.286648] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 711.294103] team0: Port device team_slave_1 added [ 711.299450] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 711.306914] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 711.367987] device hsr_slave_0 entered promiscuous mode [ 711.434041] device hsr_slave_1 entered promiscuous mode [ 711.474513] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 711.481830] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 711.496497] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.502869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 711.509558] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.516059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.550938] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 711.557786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 711.566484] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 711.575766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 711.583219] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.590581] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.598055] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 711.609307] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 711.616185] 8021q: adding VLAN 0 to HW filter on device team0 [ 711.626033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 711.633598] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.639974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.654209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 711.661775] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.668151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 711.686297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 711.694240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 711.701821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 711.710298] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 711.721061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 711.731465] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 711.737954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 711.745535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 711.759997] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 711.768172] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 711.776824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 711.790318] 8021q: adding VLAN 0 to HW filter on device batadv0 23:58:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x0) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 23:58:02 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x7ffff000}], 0x20000000000001c1) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000a00000000000200000000", 0x58}], 0x1) 23:58:02 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x30) 23:58:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000e00000000000200000000", 0x58}], 0x1) [ 711.960517] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 711.963758] protocol 88fb is buggy, dev hsr_slave_0 [ 711.983221] protocol 88fb is buggy, dev hsr_slave_1 23:58:02 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000002) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x0) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:02 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x48) 23:58:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000f00000000000200000000", 0x58}], 0x1) 23:58:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 712.203777] protocol 88fb is buggy, dev hsr_slave_0 [ 712.208948] protocol 88fb is buggy, dev hsr_slave_1 [ 712.243778] protocol 88fb is buggy, dev hsr_slave_0 [ 712.248933] protocol 88fb is buggy, dev hsr_slave_1 23:58:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00006000000000000200000000", 0x58}], 0x1) 23:58:02 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000003) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x0) socket$packet(0x11, 0xa, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:03 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x4c) 23:58:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000400000008000300000000000840440000000000080002000000000018000400000000000000000000000000000000009901000010"], 0x3}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 23:58:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000df00000000000200000000", 0x58}], 0x1) 23:58:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:03 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000004) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000f000000000000200000000", 0x58}], 0x1) [ 712.696442] device bridge_slave_1 left promiscuous mode [ 712.715892] bridge0: port 2(bridge_slave_1) entered disabled state 23:58:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) [ 712.787073] device bridge_slave_0 left promiscuous mode [ 712.792606] bridge0: port 1(bridge_slave_0) entered disabled state 23:58:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00004003000000000200000000", 0x58}], 0x1) 23:58:03 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000005) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) [ 713.130810] device hsr_slave_1 left promiscuous mode [ 713.182383] device hsr_slave_0 left promiscuous mode [ 713.251355] team0 (unregistering): Port device team_slave_1 removed [ 713.288271] team0 (unregistering): Port device team_slave_0 removed [ 713.309741] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 713.365418] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 713.568337] bond0 (unregistering): Released all slaves [ 714.679656] IPVS: ftp: loaded support on port[0] = 21 [ 714.795938] chnl_net:caif_netlink_parms(): no params data found [ 714.840081] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.846800] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.855107] device bridge_slave_0 entered promiscuous mode [ 714.862199] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.868687] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.878003] device bridge_slave_1 entered promiscuous mode [ 714.897995] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 714.907519] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 714.933512] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 714.954506] team0: Port device team_slave_0 added [ 714.960266] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 714.984310] team0: Port device team_slave_1 added [ 714.989728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 714.999162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 715.075825] device hsr_slave_0 entered promiscuous mode [ 715.114113] device hsr_slave_1 entered promiscuous mode [ 715.154485] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 715.161614] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 715.436794] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 715.470990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 715.592618] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 715.601634] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 715.609709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 715.616860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 715.737831] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 715.744567] 8021q: adding VLAN 0 to HW filter on device team0 [ 715.753525] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 715.762059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 715.770445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 715.778471] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.785038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 715.794228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 715.801248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 715.809071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 715.817567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 715.825545] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.832023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 715.955539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 715.964564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 715.973393] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 716.093447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 716.103286] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 716.110874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 716.119110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 716.129642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 716.137382] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 716.144796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 716.152728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 716.271358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 716.279120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 716.286956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 716.408454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 716.415626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 716.423288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 716.433048] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 716.440579] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 716.563307] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 716.572574] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 716.578960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 716.585742] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 716.707217] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 716.746074] device bridge_slave_1 left promiscuous mode [ 716.751605] bridge0: port 2(bridge_slave_1) entered disabled state 23:58:07 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000006) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000340000000000200000000", 0x58}], 0x1) 23:58:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 23:58:07 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x60) 23:58:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000000400000008000300000000000840440000000000080002000000000018000400000000000000000000000000000000009901000010"], 0x3}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) [ 716.785542] device bridge_slave_0 left promiscuous mode [ 716.791142] bridge0: port 1(bridge_slave_0) entered disabled state 23:58:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 716.883928] protocol 88fb is buggy, dev hsr_slave_0 [ 716.889059] protocol 88fb is buggy, dev hsr_slave_1 23:58:07 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000007) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee006b6b6b000000000200000000", 0x58}], 0x1) 23:58:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00fffff0000000000200000000", 0x58}], 0x1) 23:58:07 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000008) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 720.806302] device hsr_slave_1 left promiscuous mode [ 720.846629] device hsr_slave_0 left promiscuous mode [ 720.907004] team0 (unregistering): Port device team_slave_1 removed [ 720.918402] team0 (unregistering): Port device team_slave_0 removed [ 720.928664] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 720.970678] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 721.059541] bond0 (unregistering): Released all slaves [ 721.146360] IPVS: ftp: loaded support on port[0] = 21 23:58:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000010000000200000000", 0x58}], 0x1) 23:58:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:11 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000009) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:11 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x68) [ 721.288586] chnl_net:caif_netlink_parms(): no params data found [ 721.485376] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.502707] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.526453] device bridge_slave_0 entered promiscuous mode [ 721.534270] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.540753] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.548338] device bridge_slave_1 entered promiscuous mode [ 721.570878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 721.580900] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 721.609412] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 721.622571] team0: Port device team_slave_0 added [ 721.631706] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 721.642563] team0: Port device team_slave_1 added [ 721.651361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 721.662290] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 721.806488] device hsr_slave_0 entered promiscuous mode [ 721.904088] device hsr_slave_1 entered promiscuous mode [ 721.955309] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 721.962294] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 722.000895] bridge0: port 2(bridge_slave_1) entered blocking state [ 722.007425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 722.014102] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.020506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 722.125671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 722.137738] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 722.153535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 722.162426] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.171470] bridge0: port 2(bridge_slave_1) entered disabled state [ 722.184582] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 722.190658] 8021q: adding VLAN 0 to HW filter on device team0 [ 722.204525] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 722.212041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 722.221355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 722.229873] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.236342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 722.248061] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 722.256587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 722.265759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 722.274526] bridge0: port 2(bridge_slave_1) entered blocking state [ 722.280999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 722.291748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 722.299602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 722.314293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 722.321348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 722.338648] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 722.346097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 722.356818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 722.367806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 722.375647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 722.382793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 722.392618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 722.403578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 722.412177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 722.419989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 722.430161] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 722.437341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 722.445166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 722.459120] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 722.465349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 722.484950] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 722.492810] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 722.499836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 722.507592] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 722.519471] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 722.638243] netlink: 389 bytes leftover after parsing attributes in process `syz-executor.2'. 23:58:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) 23:58:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000020000000200000000", 0x58}], 0x1) 23:58:13 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x6c) 23:58:13 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000000a) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) io_submit(0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = fcntl$dupfd(r11, 0x406, r9) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r12, 0xc0305616, &(0x7f0000000000)={0x0, {0x2, 0x7}}) io_setup(0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) io_setup(0xb, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) r13 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) 23:58:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000040000000200000000", 0x58}], 0x1) [ 723.504636] device bridge_slave_1 left promiscuous mode [ 723.510351] bridge0: port 2(bridge_slave_1) entered disabled state 23:58:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) [ 723.564741] device bridge_slave_0 left promiscuous mode [ 723.583426] bridge0: port 1(bridge_slave_0) entered disabled state 23:58:14 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000000b) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000000a0000000200000000", 0x58}], 0x1) 23:58:14 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000000c) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) 23:58:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000000e0000000200000000", 0x58}], 0x1) [ 723.898078] device hsr_slave_1 left promiscuous mode 23:58:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000000f0000000200000000", 0x58}], 0x1) [ 723.992722] device hsr_slave_0 left promiscuous mode [ 724.063048] team0 (unregistering): Port device team_slave_1 removed [ 724.121599] team0 (unregistering): Port device team_slave_0 removed [ 724.156655] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 724.218933] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 724.429179] bond0 (unregistering): Released all slaves 23:58:15 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x74) 23:58:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) [ 725.882063] IPVS: ftp: loaded support on port[0] = 21 [ 725.952980] chnl_net:caif_netlink_parms(): no params data found [ 725.989057] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.999242] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.006345] device bridge_slave_0 entered promiscuous mode [ 726.013273] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.019811] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.027107] device bridge_slave_1 entered promiscuous mode [ 726.045333] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 726.054494] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 726.071203] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 726.078736] team0: Port device team_slave_0 added [ 726.084506] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 726.091760] team0: Port device team_slave_1 added [ 726.097183] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 726.104561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 726.166427] device hsr_slave_0 entered promiscuous mode [ 726.213985] device hsr_slave_1 entered promiscuous mode [ 726.254257] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 726.261257] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 726.276214] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.282593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 726.289248] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.295657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 726.331237] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 726.337871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 726.347462] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 726.356986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 726.364560] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.371331] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.378686] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 726.391213] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 726.397782] 8021q: adding VLAN 0 to HW filter on device team0 [ 726.408059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 726.415912] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.422333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 726.449035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 726.456884] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.463223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 726.470914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 726.479105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 726.486824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 726.494372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 726.502163] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 726.510703] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 726.519851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 726.531663] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 726.541868] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 726.548698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 726.559428] 8021q: adding VLAN 0 to HW filter on device batadv0 23:58:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000600000000200000000", 0x58}], 0x1) 23:58:17 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000000d) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) 23:58:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000000), 0x4) sendmmsg$inet6(r0, &(0x7f0000005a00)=[{{&(0x7f0000000480)={0x2, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000006b40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x28}}], 0x1, 0x0) 23:58:17 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x7a) 23:58:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(0x0, 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) 23:58:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00006b6b6b0000000200000000", 0x58}], 0x1) [ 726.857852] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:58:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000000), 0x4) sendmmsg$inet6(r0, &(0x7f0000005a00)=[{{&(0x7f0000000480)={0x2, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000006b40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x28}}], 0x1, 0x0) 23:58:17 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000000e) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(0x0, 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00ffffff9e0000000200000000", 0x58}], 0x1) 23:58:17 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xdf) 23:58:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000df0000000200000000", 0x58}], 0x1) 23:58:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(0x0, 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:17 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000000f) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000000), 0x4) sendmmsg$inet6(r0, &(0x7f0000005a00)=[{{&(0x7f0000000480)={0x2, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000006b40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x28}}], 0x1, 0x0) 23:58:17 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xf0) 23:58:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00fffffff00000000200000000", 0x58}], 0x1) 23:58:17 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000010) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000000), 0x4) sendmmsg$inet6(r0, &(0x7f0000005a00)=[{{&(0x7f0000000480)={0x2, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000006b40)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @local}}}}], 0x28}}], 0x1, 0x0) 23:58:18 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x1f2) [ 727.594742] device bridge_slave_1 left promiscuous mode [ 727.600452] bridge0: port 2(bridge_slave_1) entered disabled state 23:58:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000f0ffff0000000200000000", 0x58}], 0x1) [ 727.706110] device bridge_slave_0 left promiscuous mode [ 727.714413] bridge0: port 1(bridge_slave_0) entered disabled state 23:58:18 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000011) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 727.971441] device hsr_slave_1 left promiscuous mode [ 728.028607] device hsr_slave_0 left promiscuous mode [ 728.088215] team0 (unregistering): Port device team_slave_1 removed [ 728.128237] team0 (unregistering): Port device team_slave_0 removed [ 728.172606] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 728.229754] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 728.243905] protocol 88fb is buggy, dev hsr_slave_0 [ 728.249089] protocol 88fb is buggy, dev hsr_slave_1 [ 728.411220] bond0 (unregistering): Released all slaves 23:58:19 executing program 3 (fault-call:7 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee009effffff0000000200000000", 0x58}], 0x1) [ 729.561316] IPVS: ftp: loaded support on port[0] = 21 [ 729.634969] chnl_net:caif_netlink_parms(): no params data found [ 729.677052] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.683613] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.691169] device bridge_slave_0 entered promiscuous mode [ 729.698781] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.705463] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.712974] device bridge_slave_1 entered promiscuous mode [ 729.735626] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 729.745155] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 729.762739] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 729.771105] team0: Port device team_slave_0 added [ 729.776848] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 729.785152] team0: Port device team_slave_1 added [ 729.790587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 729.798066] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 729.870582] device hsr_slave_0 entered promiscuous mode [ 729.934072] device hsr_slave_1 entered promiscuous mode [ 729.974422] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 729.981461] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 729.998085] bridge0: port 2(bridge_slave_1) entered blocking state [ 730.004547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 730.011900] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.018451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 730.055181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 730.063503] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 730.073276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 730.080846] bridge0: port 1(bridge_slave_0) entered disabled state [ 730.088090] bridge0: port 2(bridge_slave_1) entered disabled state [ 730.361929] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 730.368598] 8021q: adding VLAN 0 to HW filter on device team0 [ 730.380872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 730.388971] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.395433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 730.536027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 730.543684] bridge0: port 2(bridge_slave_1) entered blocking state [ 730.550096] bridge0: port 2(bridge_slave_1) entered forwarding state [ 730.563032] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 730.570179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 730.581027] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 730.700914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 730.711172] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 730.719026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 730.727210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 730.848067] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 730.856875] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 730.864196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 730.871933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 730.882182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 731.000480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 731.008251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 731.017872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 731.026127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 731.033950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 731.044297] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 731.050337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 731.175196] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 731.182937] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 731.189993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 731.197255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 731.208673] 8021q: adding VLAN 0 to HW filter on device batadv0 23:58:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x2000) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x2a0081) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xffc0, 0x80, 0x4, 0xffffff31}, {0x1, 0x4, 0x6, 0x1}]}) prctl$PR_GET_TIMERSLACK(0x1e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, 0x0) pkey_alloc(0x0, 0x0) 23:58:22 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000012) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00f0ffffff0000000200000000", 0x58}], 0x1) 23:58:22 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x300) 23:58:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000300000000", 0x58}], 0x1) 23:58:22 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000013) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000000000ffffffff00000000", 0x58}], 0x1) 23:58:22 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000014) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 732.045723] bond0: Releasing backup interface bond_slave_1 23:58:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000200000000000200000000", 0x58}], 0x1) 23:58:22 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x500) [ 732.403795] protocol 88fb is buggy, dev hsr_slave_0 [ 732.408944] protocol 88fb is buggy, dev hsr_slave_1 [ 732.427449] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 732.484636] device bridge_slave_1 left promiscuous mode [ 732.490169] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.534753] device bridge_slave_0 left promiscuous mode [ 732.540266] bridge0: port 1(bridge_slave_0) entered disabled state [ 732.803775] protocol 88fb is buggy, dev hsr_slave_0 [ 732.803800] protocol 88fb is buggy, dev hsr_slave_1 [ 732.808885] protocol 88fb is buggy, dev hsr_slave_1 [ 736.107204] device hsr_slave_1 left promiscuous mode [ 736.146800] device hsr_slave_0 left promiscuous mode [ 736.187466] team0 (unregistering): Port device team_slave_1 removed [ 736.199823] team0 (unregistering): Port device team_slave_0 removed [ 736.211135] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 736.278305] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 736.379790] bond0 (unregistering): Released all slaves 23:58:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:26 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000015) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000400000000000200000000", 0x58}], 0x1) 23:58:26 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') utime(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x33028}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000280)={0xe, 0x2, 0x2, 0xab, 0xb7, "0b71b07e7373c144d932a34878e48827a86bedfa5e4f03b3a76c3d64b183d996785e984190bbd6ae2f003a2dad1a1b8e1ac272364bbb9bd83e2ff7387c7ac1260bfe1a9db70162a414dcb534417e6ae23758a5c753271c2534c31d6235cab72048eef256650ad7a235e8237a2b8762c19bed128c15f35ad4b2f2682bd2b013e9fb19b5ec9fb1e3fe808925377fb515964197d94748cd8ceae8b81eab85cf01b391920efbbd292eba334b0860cbbee39a98a72f693a19d2"}, 0xc3) sendfile(r0, r0, &(0x7f0000000240), 0x2008000fffffffe) creat(0x0, 0x0) 23:58:27 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x600) [ 736.454351] IPVS: ftp: loaded support on port[0] = 21 [ 736.822189] chnl_net:caif_netlink_parms(): no params data found [ 736.916126] bridge0: port 1(bridge_slave_0) entered blocking state [ 736.922875] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.937805] device bridge_slave_0 entered promiscuous mode [ 736.950461] bridge0: port 2(bridge_slave_1) entered blocking state [ 736.959940] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.977797] device bridge_slave_1 entered promiscuous mode [ 737.021814] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 737.040118] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 737.078105] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 737.086153] team0: Port device team_slave_0 added [ 737.092812] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 737.101258] team0: Port device team_slave_1 added [ 737.106978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 737.116955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 737.186936] device hsr_slave_0 entered promiscuous mode [ 737.224039] device hsr_slave_1 entered promiscuous mode [ 737.264383] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 737.271365] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 737.310688] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.317202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 737.324055] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.330407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 737.429679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 737.445263] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.452617] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.470266] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 737.486280] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 737.492516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 737.507251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 737.520580] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 737.530371] 8021q: adding VLAN 0 to HW filter on device team0 [ 737.547230] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 737.558642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 737.571299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 737.582494] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.588964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 737.598926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 737.607452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 737.615407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 737.623005] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.629772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 737.638961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 737.646630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 737.657006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 737.665345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 737.677919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 737.685544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 737.693465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 737.705226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 737.714217] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 737.721393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 737.730066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 737.740555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 737.750818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 737.757783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 737.766323] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 737.774133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 737.781747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 737.792743] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 737.799241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 737.827360] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 737.845483] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 737.851802] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 737.859593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 737.871283] 8021q: adding VLAN 0 to HW filter on device batadv0 23:58:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x7ffff) 23:58:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000a00000000000200000000", 0x58}], 0x1) 23:58:28 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000016) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:28 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x700) 23:58:28 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCFLSH(r4, 0x540b, 0x7fff) sendmmsg(r2, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0, 0xe3ddbcab1d643406, 0x0, 0x0, 0x100000000000000}}], 0x1, 0x4000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000180)="8bf80f1f71a615bdf9233d51a0429284009305311570a3d3cd0a6910959cb1a5458598090b5d3ae17b1ace0288f281912b63a88bdc2f90", 0xfffffffffffffe38) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000100)=0x5, 0x4) 23:58:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000e00000000000200000000", 0x58}], 0x1) 23:58:28 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xa00) 23:58:28 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000017) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x20000112) 23:58:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000f00000000000200000000", 0x58}], 0x1) 23:58:28 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000018) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:28 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xe00) 23:58:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/\x02\xff\xff\xff\xfd\x00', 0x101000, 0x0) mount$fuseblk(&(0x7f0000000240)='/dev/loop0\x00', 0x0, 0x0, 0x80010, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) bind$bt_sco(r1, &(0x7f0000000340)={0x1f, {0x3f, 0x0, 0x4, 0x20, 0x3, 0x2}}, 0x8) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0xffffffffffffffc2}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000200)=0x6, 0x4) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}]}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet6(r9, &(0x7f00000000c0)=[{{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x18f}}, {{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@pktinfo={{0x24, 0x29, 0x32, {@dev, r11}}}], 0x28}}], 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000480)={'team0\x00', r11}) r12 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) readlinkat(r12, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/178, 0xb2) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 23:58:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00006000000000000200000000", 0x58}], 0x1) [ 739.375933] device bridge_slave_1 left promiscuous mode [ 739.381452] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.425118] device bridge_slave_0 left promiscuous mode [ 739.430600] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.567118] device hsr_slave_1 left promiscuous mode [ 739.608794] device hsr_slave_0 left promiscuous mode [ 739.649437] team0 (unregistering): Port device team_slave_1 removed [ 739.661533] team0 (unregistering): Port device team_slave_0 removed [ 739.672716] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 739.717750] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 739.805396] bond0 (unregistering): Released all slaves [ 740.343431] IPVS: ftp: loaded support on port[0] = 21 [ 740.538396] chnl_net:caif_netlink_parms(): no params data found [ 740.620175] bridge0: port 1(bridge_slave_0) entered blocking state [ 740.627023] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.635443] device bridge_slave_0 entered promiscuous mode [ 740.643602] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.651233] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.659757] device bridge_slave_1 entered promiscuous mode [ 740.690615] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 740.701444] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 740.731573] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 740.740045] team0: Port device team_slave_0 added [ 740.746951] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 740.755408] team0: Port device team_slave_1 added [ 740.761015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 740.769084] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 740.849309] device hsr_slave_0 entered promiscuous mode [ 740.914097] device hsr_slave_1 entered promiscuous mode [ 740.964070] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 740.971142] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 741.001814] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 741.055899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 741.064544] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 741.073055] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 741.093882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 741.101039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 741.111562] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 741.118116] 8021q: adding VLAN 0 to HW filter on device team0 [ 741.128405] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 741.135694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 741.144418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 741.152426] bridge0: port 1(bridge_slave_0) entered blocking state [ 741.159137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 741.170717] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 741.178541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 741.186550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 741.197733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 741.207230] bridge0: port 2(bridge_slave_1) entered blocking state [ 741.213746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 741.227348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 741.234678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 741.245314] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 741.252748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 741.264885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 741.274931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 741.282153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 741.296835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 741.305018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 741.312975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 741.323329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 741.331240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 741.339282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 741.348352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 741.358757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 741.368527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 741.377864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 741.392138] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 741.399527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 741.417900] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 741.427231] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 741.433580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 741.442169] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 741.453162] 8021q: adding VLAN 0 to HW filter on device batadv0 23:58:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x100000, 0x0) sendto$unix(r3, &(0x7f0000000640)="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", 0x1000, 0x80, &(0x7f0000000180)=@file={0x445e602a1e3aa32b, './file0\x00'}, 0x6e) sendfile(r1, r1, 0x0, 0x2) r4 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f0000000240)=@name={0x1e, 0x2, 0x1, {{0x41, 0x3}, 0x1}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="843404dca32521e6c9291e6c119a0f260f02703ef71e", 0x16}, {&(0x7f00000002c0)="4c34da4185468c7b5a1d17a2f666f0ea36b44d03492bd4658478f066065776b2114343a1d3c9af12c8411b21ce30eedc70008f59d0308220ea46020e26b01eae1fab2732214f1445c563c5288f6a1aa48c1462da90d48d0a8bb77f856237aeece455f5cedfd739dac5e4e2940626a5fb4456b9f4e9305e8bed754d558afed0ad32f22c22330a0dd0b1c92a44ca92d0662d5494d7bdbf16a942fefdef6d175eba6a0714d0f639b05715001c1da9cfe79e29", 0xb1}], 0x2, &(0x7f0000000400)="26e6b74f97cd4f5f1664eafb9c2ef4b41c2ae818dfdaa56cc8ea3073b1aed51c3951b15f542819c38393bcf6970d838b6f32597d5bc390d15f23599e0dac4db2f2c27d0c825c08bedec6d0f9388bf5519c5710962f35e601c61f3fcc888d6efff3d90be98695545de16bec48c2262f4d8bb88b10", 0x74, 0x20000010}, 0x100) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) 23:58:32 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xec0) 23:58:32 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000019) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000df00000000000200000000", 0x58}], 0x1) 23:58:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x20000112) 23:58:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000f000000000000200000000", 0x58}], 0x1) 23:58:32 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8, 0x8000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x400}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000240)={r3, 0x42, "699943a7ca04f8242ba79ca6f4e2ae0c0cbdc5db474d9df802a000ec5b44dd40012dbda879996e06fd1a15af27f69d8289e64088daad10e655b555dc8f277736d178"}, &(0x7f00000002c0)=0x4a) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3fbb, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f00000000c0)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r4, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f86ddeb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000340), 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) 23:58:32 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000001a) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:32 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xef9) 23:58:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) socket$xdp(0x2c, 0x3, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) ioctl$LOOP_CLR_FD(r2, 0x4c01) 23:58:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000000a000000000200000000", 0x58}], 0x1) 23:58:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r1 = openat$cgroup_procs(r0, &(0x7f0000000600)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x2) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 23:58:32 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0xf00) 23:58:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:32 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000001b) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000000e000000000200000000", 0x58}], 0x1) 23:58:32 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x1200) [ 742.329894] device bridge_slave_1 left promiscuous mode [ 742.336706] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.378604] device bridge_slave_0 left promiscuous mode [ 742.389381] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.409155] protocol 88fb is buggy, dev hsr_slave_0 [ 742.414812] protocol 88fb is buggy, dev hsr_slave_1 23:58:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000040)={0xffff, 0x4, 0x1, 0xffffff21, 0x7fff, 0x20, 0x380}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0xf) ioctl$KDADDIO(r5, 0x400455c8, 0x1) [ 742.572627] device hsr_slave_1 left promiscuous mode 23:58:33 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000001c) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000000f000000000200000000", 0x58}], 0x1) 23:58:33 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x1300) [ 742.628427] device hsr_slave_0 left promiscuous mode 23:58:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000060000000000200000000", 0x58}], 0x1) [ 742.688940] team0 (unregistering): Port device team_slave_1 removed 23:58:33 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000001d) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 742.746495] team0 (unregistering): Port device team_slave_0 removed [ 742.815193] bond0 (unregistering): Releasing backup interface bond_slave_1 23:58:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000df000000000200000000", 0x58}], 0x1) [ 742.886623] bond0 (unregistering): Releasing backup interface bond_slave_0 23:58:33 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x200000000000001e) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) [ 743.056741] bond0 (unregistering): Released all slaves [ 743.135396] Bluetooth: Error in BCSP hdr checksum [ 744.813507] IPVS: ftp: loaded support on port[0] = 21 [ 744.884852] Bluetooth: hci0: command 0x1003 tx timeout [ 744.890738] Bluetooth: hci0: sending frame failed (-49) [ 744.898393] chnl_net:caif_netlink_parms(): no params data found [ 744.933442] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.940001] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.947593] device bridge_slave_0 entered promiscuous mode [ 744.954901] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.961427] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.968951] device bridge_slave_1 entered promiscuous mode [ 744.985915] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 744.995404] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 745.014516] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 745.026166] team0: Port device team_slave_0 added [ 745.031737] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 745.039254] team0: Port device team_slave_1 added [ 745.044720] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 745.052146] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 745.108461] device hsr_slave_0 entered promiscuous mode [ 745.154091] device hsr_slave_1 entered promiscuous mode [ 745.194379] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 745.201423] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 745.216990] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.223383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 745.230094] bridge0: port 1(bridge_slave_0) entered blocking state [ 745.236515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 745.272070] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 745.278994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 745.289462] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 745.298609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 745.305977] bridge0: port 1(bridge_slave_0) entered disabled state [ 745.312951] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.320487] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 745.331072] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 745.337643] 8021q: adding VLAN 0 to HW filter on device team0 [ 745.347670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 745.356386] bridge0: port 1(bridge_slave_0) entered blocking state [ 745.362766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 745.373217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 745.381353] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.387926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 745.405590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 745.414137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 745.421934] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 745.434615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 745.441990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 745.450867] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 745.457380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 745.472758] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 745.480967] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 745.488713] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 745.501408] 8021q: adding VLAN 0 to HW filter on device batadv0 23:58:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000200)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x35ca322e, 0x1, 0x0, 0x0, 0xcc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x0, 0x300) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)=""/77, 0x4d) socket$inet6(0xa, 0x1, 0x6) pipe2(&(0x7f0000000240), 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='\x00\x00\xd1\x00\xaa\x00\x00\x8e\t\x00', 0x382702, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000002c0)) listen(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={0x0, 0xbc, 0x9b}, 0x0, &(0x7f00000000c0)="06c5d6fdbca344fd6b539c174c69d76507f118b1f1dbacbe181547ceb307f79f579b4a065c8d69ae91e746920f68a0e7cb8096416c622867545b2a9e0555c50f307fb6101224484633afbab7bee2a9b5bf4a6c23008c8d622be158cf19b7d3bd62c4404c275fddc54d7e0dd9a5d013df11c0a580db3fc70a8e395f459e94e1e1dce77b62741d91de56fbcbc5ef0e7dfc1a441e5f22b4b029c4f02846f16053e682a186e1e299c87c08d29833e8696fd5dc381ea43b7192e6949eac46", &(0x7f0000000180)=""/155) 23:58:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a117fffffff81004e22000ddfff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000f0000000000200000000", 0x58}], 0x1) 23:58:36 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f0000055000)={0xffb}, 0x0, 0x8) r1 = getpid() process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/82, 0x52}], 0x1, 0x0) r2 = gettid() readv(r0, &(0x7f0000000040)=[{&(0x7f0000fc7000)=""/128, 0x80}], 0x2000000000000021) tgkill(r1, r2, 0x1000000000002) signalfd4(r0, &(0x7f0000000080)={0x8f4b}, 0x8, 0x0) 23:58:36 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0xfffffffc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r5) r6 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xff40) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x1400) [ 746.274722] device bridge_slave_1 left promiscuous mode [ 746.280235] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.325040] device bridge_slave_0 left promiscuous mode [ 746.330504] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.449866] device hsr_slave_1 left promiscuous mode [ 746.508474] device hsr_slave_0 left promiscuous mode [ 746.577041] team0 (unregistering): Port device team_slave_1 removed [ 746.589278] team0 (unregistering): Port device team_slave_0 removed [ 746.599711] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 746.638681] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 746.712118] bond0 (unregistering): Released all slaves [ 746.963817] Bluetooth: hci0: command 0x1001 tx timeout [ 746.969272] Bluetooth: hci0: sending frame failed (-49) [ 749.043822] Bluetooth: hci0: command 0x1009 tx timeout [ 753.209755] ================================================================== [ 753.217297] BUG: KASAN: use-after-free in kfree_skb+0x38/0x390 [ 753.223255] Read of size 4 at addr ffff8880a380e2e4 by task syz-executor.2/14524 [ 753.230800] [ 753.232417] CPU: 0 PID: 14524 Comm: syz-executor.2 Not tainted 4.19.83 #0 [ 753.239361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.248699] Call Trace: [ 753.251281] dump_stack+0x172/0x1f0 [ 753.254895] ? kfree_skb+0x38/0x390 [ 753.258506] print_address_description.cold+0x7c/0x20d [ 753.263787] ? kfree_skb+0x38/0x390 [ 753.267397] kasan_report.cold+0x8c/0x2ba [ 753.271529] check_memory_region+0x123/0x190 [ 753.275923] kasan_check_read+0x11/0x20 [ 753.279886] kfree_skb+0x38/0x390 [ 753.283395] bcsp_close+0xc7/0x130 [ 753.287101] hci_uart_tty_close+0x1ea/0x250 [ 753.291477] ? hci_uart_close+0x50/0x50 [ 753.295518] tty_ldisc_close.isra.0+0xaf/0xe0 [ 753.300004] tty_ldisc_kill+0x4b/0xc0 [ 753.303799] tty_ldisc_release+0xc6/0x280 [ 753.307943] tty_release_struct+0x1b/0x50 [ 753.312082] tty_release+0xbcb/0xe90 [ 753.315782] ? put_tty_driver+0x20/0x20 [ 753.319768] __fput+0x2dd/0x8b0 [ 753.323033] ____fput+0x16/0x20 [ 753.326299] task_work_run+0x145/0x1c0 [ 753.330175] exit_to_usermode_loop+0x273/0x2c0 [ 753.334746] do_syscall_64+0x53d/0x620 [ 753.338620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.343791] RIP: 0033:0x413db1 [ 753.346967] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 753.365851] RSP: 002b:00007ffe81655590 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 753.373544] RAX: 0000000000000000 RBX: 000000000000000b RCX: 0000000000413db1 [ 753.380797] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 753.388057] RBP: 0000000000000001 R08: 00000000f585186b R09: 00000000b38c8ba9 [ 753.395318] R10: 00007ffe81655670 R11: 0000000000000293 R12: 000000000075c9a0 [ 753.402574] R13: 000000000075c9a0 R14: 0000000000760828 R15: 000000000075c124 [ 753.409833] [ 753.411497] Allocated by task 8814: [ 753.415111] save_stack+0x45/0xd0 [ 753.418545] kasan_kmalloc+0xce/0xf0 [ 753.422241] kasan_slab_alloc+0xf/0x20 [ 753.426111] kmem_cache_alloc_node+0x144/0x710 [ 753.430677] __alloc_skb+0xd5/0x5f0 [ 753.434295] bcsp_recv+0x8c7/0x13a0 [ 753.437904] hci_uart_tty_receive+0x225/0x530 [ 753.442384] tty_ldisc_receive_buf+0x15f/0x1c0 [ 753.446950] tty_port_default_receive_buf+0x7d/0xb0 [ 753.451949] flush_to_ldisc+0x222/0x390 [ 753.455982] process_one_work+0x989/0x1750 [ 753.460270] worker_thread+0x98/0xe40 [ 753.464062] kthread+0x354/0x420 [ 753.467449] ret_from_fork+0x24/0x30 [ 753.471138] [ 753.472747] Freed by task 8814: [ 753.476009] save_stack+0x45/0xd0 [ 753.479442] __kasan_slab_free+0x102/0x150 [ 753.483666] kasan_slab_free+0xe/0x10 [ 753.487454] kmem_cache_free+0x86/0x260 [ 753.491415] kfree_skbmem+0xcb/0x150 [ 753.495108] kfree_skb+0xf0/0x390 [ 753.498583] bcsp_recv+0x2d8/0x13a0 [ 753.502193] hci_uart_tty_receive+0x225/0x530 [ 753.506694] tty_ldisc_receive_buf+0x15f/0x1c0 [ 753.511257] tty_port_default_receive_buf+0x7d/0xb0 [ 753.516340] flush_to_ldisc+0x222/0x390 [ 753.520297] process_one_work+0x989/0x1750 [ 753.524514] worker_thread+0x98/0xe40 [ 753.528306] kthread+0x354/0x420 [ 753.531676] ret_from_fork+0x24/0x30 [ 753.535364] [ 753.536974] The buggy address belongs to the object at ffff8880a380e200 [ 753.536974] which belongs to the cache skbuff_head_cache of size 232 [ 753.550134] The buggy address is located 228 bytes inside of [ 753.550134] 232-byte region [ffff8880a380e200, ffff8880a380e2e8) [ 753.561990] The buggy address belongs to the page: [ 753.566902] page:ffffea00028e0380 count:1 mapcount:0 mapping:ffff8880aa347ac0 index:0x0 [ 753.575035] flags: 0x1fffc0000000100(slab) [ 753.579265] raw: 01fffc0000000100 ffffea0002377988 ffffea000224e008 ffff8880aa347ac0 [ 753.587127] raw: 0000000000000000 ffff8880a380e0c0 000000010000000c 0000000000000000 [ 753.594986] page dumped because: kasan: bad access detected [ 753.600679] [ 753.602286] Memory state around the buggy address: [ 753.607197] ffff8880a380e180: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 753.614535] ffff8880a380e200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.621874] >ffff8880a380e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 753.629213] ^ [ 753.635697] ffff8880a380e300: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 753.643055] ffff8880a380e380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 753.650446] ================================================================== [ 753.657982] Disabling lock debugging due to kernel taint [ 753.664165] Kernel panic - not syncing: panic_on_warn set ... [ 753.664165] [ 753.671549] CPU: 0 PID: 14524 Comm: syz-executor.2 Tainted: G B 4.19.83 #0 [ 753.679864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.689202] Call Trace: [ 753.691786] dump_stack+0x172/0x1f0 [ 753.695392] ? kfree_skb+0x38/0x390 [ 753.699061] panic+0x26a/0x50e [ 753.702245] ? __warn_printk+0xf3/0xf3 [ 753.706121] ? kfree_skb+0x38/0x390 [ 753.709732] ? preempt_schedule+0x4b/0x60 [ 753.713861] ? ___preempt_schedule+0x16/0x18 [ 753.718250] ? trace_hardirqs_on+0x5e/0x220 [ 753.722562] ? kfree_skb+0x38/0x390 [ 753.726187] kasan_end_report+0x47/0x4f [ 753.730144] kasan_report.cold+0xa9/0x2ba [ 753.734286] check_memory_region+0x123/0x190 [ 753.738675] kasan_check_read+0x11/0x20 [ 753.742637] kfree_skb+0x38/0x390 [ 753.746075] bcsp_close+0xc7/0x130 [ 753.749599] hci_uart_tty_close+0x1ea/0x250 [ 753.753900] ? hci_uart_close+0x50/0x50 [ 753.757856] tty_ldisc_close.isra.0+0xaf/0xe0 [ 753.762358] tty_ldisc_kill+0x4b/0xc0 [ 753.766153] tty_ldisc_release+0xc6/0x280 [ 753.770284] tty_release_struct+0x1b/0x50 [ 753.774414] tty_release+0xbcb/0xe90 [ 753.778110] ? put_tty_driver+0x20/0x20 [ 753.782073] __fput+0x2dd/0x8b0 [ 753.785336] ____fput+0x16/0x20 [ 753.788595] task_work_run+0x145/0x1c0 [ 753.792474] exit_to_usermode_loop+0x273/0x2c0 [ 753.797037] do_syscall_64+0x53d/0x620 [ 753.800994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.806189] RIP: 0033:0x413db1 [ 753.809367] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 753.828262] RSP: 002b:00007ffe81655590 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 753.835973] RAX: 0000000000000000 RBX: 000000000000000b RCX: 0000000000413db1 [ 753.843227] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 753.850480] RBP: 0000000000000001 R08: 00000000f585186b R09: 00000000b38c8ba9 [ 753.857743] R10: 00007ffe81655670 R11: 0000000000000293 R12: 000000000075c9a0 [ 753.864997] R13: 000000000075c9a0 R14: 0000000000760828 R15: 000000000075c124 [ 753.873719] Kernel Offset: disabled [ 753.877348] Rebooting in 86400 seconds..