009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81\n?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 07:56:49 executing program 2: gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100002000633277fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 07:56:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x2, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) socket(0x10, 0x0, 0x0) 07:56:49 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2938.583764][ T5180] device bridge_slave_1 left promiscuous mode [ 2938.590617][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2938.648569][ T5180] device bridge_slave_0 left promiscuous mode [ 2938.665097][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state 07:56:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)) 07:56:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4$packet(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 07:56:49 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2938.883479][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 07:56:49 executing program 3: 07:56:49 executing program 0: [ 2940.478082][ T5180] device hsr_slave_0 left promiscuous mode [ 2940.517852][ T5180] device hsr_slave_1 left promiscuous mode [ 2940.571085][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2940.582335][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2940.593730][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2940.652038][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2940.750591][ T5180] bond0 (unregistering): Released all slaves 07:56:51 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:56:51 executing program 3: 07:56:51 executing program 0: 07:56:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)) [ 2941.069774][ T6327] IPVS: ftp: loaded support on port[0] = 21 [ 2941.188145][ T6327] chnl_net:caif_netlink_parms(): no params data found [ 2941.224704][ T6327] bridge0: port 1(bridge_slave_0) entered blocking state [ 2941.232342][ T6327] bridge0: port 1(bridge_slave_0) entered disabled state [ 2941.240570][ T6327] device bridge_slave_0 entered promiscuous mode [ 2941.248479][ T6327] bridge0: port 2(bridge_slave_1) entered blocking state [ 2941.255559][ T6327] bridge0: port 2(bridge_slave_1) entered disabled state [ 2941.263948][ T6327] device bridge_slave_1 entered promiscuous mode [ 2941.282564][ T6327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2941.293394][ T6327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2941.314862][ T6327] team0: Port device team_slave_0 added [ 2941.321705][ T6327] team0: Port device team_slave_1 added [ 2941.383742][ T6327] device hsr_slave_0 entered promiscuous mode [ 2941.441225][ T6327] device hsr_slave_1 entered promiscuous mode [ 2941.495856][ T6327] bridge0: port 2(bridge_slave_1) entered blocking state [ 2941.503011][ T6327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2941.510478][ T6327] bridge0: port 1(bridge_slave_0) entered blocking state [ 2941.517571][ T6327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2941.551496][ T6327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2941.564064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2941.572916][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 2941.581445][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 2941.594911][ T6327] 8021q: adding VLAN 0 to HW filter on device team0 [ 2941.610610][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2941.623068][T26317] bridge0: port 1(bridge_slave_0) entered blocking state [ 2941.630150][T26317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2941.651552][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2941.661320][T26317] bridge0: port 2(bridge_slave_1) entered blocking state [ 2941.668433][T26317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2941.692842][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2941.704005][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2941.716670][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2941.736698][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2941.768161][ T6327] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2941.793300][ T6327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2941.801464][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2941.816005][ T6331] IPVS: ftp: loaded support on port[0] = 21 [ 2941.836880][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2941.844809][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2941.864132][ T6327] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2941.944005][ T6331] chnl_net:caif_netlink_parms(): no params data found [ 2941.972246][ T6331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2941.979451][ T6331] bridge0: port 1(bridge_slave_0) entered disabled state [ 2941.987311][ T6331] device bridge_slave_0 entered promiscuous mode [ 2941.996967][ T6331] bridge0: port 2(bridge_slave_1) entered blocking state [ 2942.004155][ T6331] bridge0: port 2(bridge_slave_1) entered disabled state [ 2942.012261][ T6331] device bridge_slave_1 entered promiscuous mode [ 2942.030127][ T6331] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2942.040923][ T6331] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2942.060878][ T6331] team0: Port device team_slave_0 added [ 2942.068101][ T6331] team0: Port device team_slave_1 added 07:56:53 executing program 2: 07:56:53 executing program 0: 07:56:53 executing program 3: 07:56:53 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:56:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)) [ 2942.120487][ T6331] device hsr_slave_0 entered promiscuous mode [ 2942.154168][ T6331] device hsr_slave_1 entered promiscuous mode [ 2942.219073][ T6331] debugfs: Directory 'hsr0' with parent '/' already present! [ 2942.710367][ T6331] bridge0: port 2(bridge_slave_1) entered blocking state [ 2942.717514][ T6331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2942.724882][ T6331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2942.731958][ T6331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2942.880253][ T6331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2942.894374][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2942.902832][ T5609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2942.915137][ T5609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2943.060925][ T6331] 8021q: adding VLAN 0 to HW filter on device team0 [ 2943.310083][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2943.318944][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2943.327362][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 2943.334471][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2943.343002][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2943.352168][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2943.360822][ T5608] bridge0: port 2(bridge_slave_1) entered blocking state [ 2943.368027][ T5608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2943.376008][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2943.385399][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2943.394372][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2943.402936][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2943.411917][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2943.420718][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2943.434521][ T6331] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2943.445283][ T6331] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2943.460292][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2943.468723][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2943.477337][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2943.485839][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2943.494595][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2943.503102][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2943.594084][ T6331] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2943.602448][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2943.610571][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2944.148628][ T5180] device bridge_slave_1 left promiscuous mode [ 2944.154908][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2944.198671][ T5180] device bridge_slave_0 left promiscuous mode [ 2944.204939][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2944.259016][ T5180] device bridge_slave_1 left promiscuous mode [ 2944.265301][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2944.318432][ T5180] device bridge_slave_0 left promiscuous mode [ 2944.324725][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2944.369548][ T5180] device bridge_slave_1 left promiscuous mode [ 2944.375775][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2944.438518][ T5180] device bridge_slave_0 left promiscuous mode [ 2944.444798][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state 07:56:55 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:56:55 executing program 0: 07:56:55 executing program 2: 07:56:55 executing program 3: 07:56:55 executing program 5: 07:56:55 executing program 5: 07:56:55 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x40}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) write$FUSE_ENTRY(r0, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}, 0x90) 07:56:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x10) 07:56:55 executing program 2: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x7ff, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000001c0)={0x0, 0x1, 0x2000000000000002, {0x1}}) 07:56:55 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) [ 2946.788171][ T5180] device hsr_slave_0 left promiscuous mode [ 2946.857902][ T5180] device hsr_slave_1 left promiscuous mode [ 2946.915103][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2946.925200][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2946.935469][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2946.991808][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2947.070103][ T5180] bond0 (unregistering): Released all slaves [ 2947.228075][ T5180] device hsr_slave_0 left promiscuous mode [ 2947.267901][ T5180] device hsr_slave_1 left promiscuous mode [ 2947.318421][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2947.328695][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2947.338512][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2947.372323][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2947.448922][ T5180] bond0 (unregistering): Released all slaves [ 2947.588517][ T5180] device hsr_slave_0 left promiscuous mode [ 2947.628176][ T5180] device hsr_slave_1 left promiscuous mode [ 2947.674573][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2947.684751][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2947.695342][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2947.731815][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2947.809142][ T5180] bond0 (unregistering): Released all slaves [ 2947.975816][ T6368] IPVS: ftp: loaded support on port[0] = 21 [ 2948.033408][ T6368] chnl_net:caif_netlink_parms(): no params data found [ 2948.068950][ T6368] bridge0: port 1(bridge_slave_0) entered blocking state [ 2948.076083][ T6368] bridge0: port 1(bridge_slave_0) entered disabled state [ 2948.084190][ T6368] device bridge_slave_0 entered promiscuous mode [ 2948.091722][ T6368] bridge0: port 2(bridge_slave_1) entered blocking state [ 2948.098882][ T6368] bridge0: port 2(bridge_slave_1) entered disabled state [ 2948.106549][ T6368] device bridge_slave_1 entered promiscuous mode [ 2948.123596][ T6368] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2948.134065][ T6368] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2948.152996][ T6368] team0: Port device team_slave_0 added [ 2948.159757][ T6368] team0: Port device team_slave_1 added [ 2948.210218][ T6368] device hsr_slave_0 entered promiscuous mode [ 2948.248141][ T6368] device hsr_slave_1 entered promiscuous mode [ 2948.307881][ T6368] debugfs: Directory 'hsr0' with parent '/' already present! [ 2948.487609][ T6368] bridge0: port 2(bridge_slave_1) entered blocking state [ 2948.494708][ T6368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2948.502040][ T6368] bridge0: port 1(bridge_slave_0) entered blocking state [ 2948.509099][ T6368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2948.549119][ T6368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2948.563638][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2948.573330][ T5609] bridge0: port 1(bridge_slave_0) entered disabled state [ 2948.583307][ T5609] bridge0: port 2(bridge_slave_1) entered disabled state [ 2948.597207][ T6368] 8021q: adding VLAN 0 to HW filter on device team0 [ 2948.612079][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2948.623128][ T5609] bridge0: port 1(bridge_slave_0) entered blocking state [ 2948.630210][ T5609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2948.651044][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2948.662258][ T5608] bridge0: port 2(bridge_slave_1) entered blocking state [ 2948.669386][ T5608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2948.692008][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2948.704118][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2948.713718][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2948.728614][ T6368] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2948.743086][ T6368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2948.751753][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2948.763571][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2948.783366][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2948.790957][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2948.803196][ T6368] 8021q: adding VLAN 0 to HW filter on device batadv0 07:57:00 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000040)="66b9800000c00f326635010000000f30260fd18300000fc72a0faef7da20d9c7f30f2a8a00000f01cabaf80c66b8d1d2f18a66efbafc0cec2e2ef30f7f708b", 0x3f}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d0]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000000)={'bridge0\x00'}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:57:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) set_tid_address(&(0x7f0000000300)) 07:57:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) set_tid_address(&(0x7f0000000300)) 07:57:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:01 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:01 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {0xffffffffffffffff, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) [ 2952.110713][ T5180] device bridge_slave_1 left promiscuous mode [ 2952.128395][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state 07:57:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x6, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2952.240308][ T5180] device bridge_slave_0 left promiscuous mode [ 2952.247749][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2953.721040][ T5180] device hsr_slave_0 left promiscuous mode [ 2953.777999][ T5180] device hsr_slave_1 left promiscuous mode [ 2953.824620][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2953.835116][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2953.845482][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2953.881707][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2953.948167][ T5180] bond0 (unregistering): Released all slaves [ 2954.212939][ T6454] IPVS: ftp: loaded support on port[0] = 21 [ 2954.213077][ T6456] IPVS: ftp: loaded support on port[0] = 21 [ 2954.374866][ T6456] chnl_net:caif_netlink_parms(): no params data found [ 2954.397249][ T6454] chnl_net:caif_netlink_parms(): no params data found [ 2954.454527][ T6456] bridge0: port 1(bridge_slave_0) entered blocking state [ 2954.465265][ T6456] bridge0: port 1(bridge_slave_0) entered disabled state [ 2954.473400][ T6456] device bridge_slave_0 entered promiscuous mode [ 2954.484609][ T6454] bridge0: port 1(bridge_slave_0) entered blocking state [ 2954.492301][ T6454] bridge0: port 1(bridge_slave_0) entered disabled state [ 2954.503360][ T6454] device bridge_slave_0 entered promiscuous mode [ 2954.511262][ T6456] bridge0: port 2(bridge_slave_1) entered blocking state [ 2954.522278][ T6456] bridge0: port 2(bridge_slave_1) entered disabled state [ 2954.530414][ T6456] device bridge_slave_1 entered promiscuous mode [ 2954.537141][ T6454] bridge0: port 2(bridge_slave_1) entered blocking state [ 2954.547907][ T6454] bridge0: port 2(bridge_slave_1) entered disabled state [ 2954.555500][ T6454] device bridge_slave_1 entered promiscuous mode [ 2954.589660][ T6456] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2954.604567][ T6454] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2954.616138][ T6454] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2954.630486][ T6456] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2954.653498][ T6456] team0: Port device team_slave_0 added [ 2954.664178][ T6456] team0: Port device team_slave_1 added [ 2954.685809][ T6454] team0: Port device team_slave_0 added [ 2954.729972][ T6456] device hsr_slave_0 entered promiscuous mode [ 2954.768265][ T6456] device hsr_slave_1 entered promiscuous mode [ 2954.817912][ T6456] debugfs: Directory 'hsr0' with parent '/' already present! [ 2954.826273][ T6454] team0: Port device team_slave_1 added [ 2954.847466][ T6460] IPVS: ftp: loaded support on port[0] = 21 [ 2954.853365][ T6456] bridge0: port 2(bridge_slave_1) entered blocking state [ 2954.860437][ T6456] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2954.867825][ T6456] bridge0: port 1(bridge_slave_0) entered blocking state [ 2954.874899][ T6456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2954.910002][ T6454] device hsr_slave_0 entered promiscuous mode [ 2954.960980][ T6454] device hsr_slave_1 entered promiscuous mode [ 2954.997901][ T6454] debugfs: Directory 'hsr0' with parent '/' already present! [ 2955.046953][ T6454] bridge0: port 2(bridge_slave_1) entered blocking state [ 2955.054052][ T6454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2955.061323][ T6454] bridge0: port 1(bridge_slave_0) entered blocking state [ 2955.068408][ T6454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2955.114436][ T6456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2955.149509][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2955.157679][T26317] bridge0: port 1(bridge_slave_0) entered disabled state [ 2955.165813][T26317] bridge0: port 2(bridge_slave_1) entered disabled state [ 2955.173850][T26317] bridge0: port 1(bridge_slave_0) entered disabled state [ 2955.181929][T26317] bridge0: port 2(bridge_slave_1) entered disabled state [ 2955.198643][ T6456] 8021q: adding VLAN 0 to HW filter on device team0 [ 2955.214148][ T6454] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2955.224116][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2955.232694][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 2955.239746][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2955.247418][ T6460] chnl_net:caif_netlink_parms(): no params data found [ 2955.263710][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2955.288825][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2955.297226][ T5609] bridge0: port 2(bridge_slave_1) entered blocking state [ 2955.304320][ T5609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2955.334986][ T6454] 8021q: adding VLAN 0 to HW filter on device team0 [ 2955.345139][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2955.352963][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2955.361007][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2955.369989][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2955.378768][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2955.387206][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 2955.394264][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2955.402521][ T6460] bridge0: port 1(bridge_slave_0) entered blocking state [ 2955.409807][ T6460] bridge0: port 1(bridge_slave_0) entered disabled state [ 2955.417482][ T6460] device bridge_slave_0 entered promiscuous mode [ 2955.425703][ T6460] bridge0: port 2(bridge_slave_1) entered blocking state [ 2955.433500][ T6460] bridge0: port 2(bridge_slave_1) entered disabled state [ 2955.441323][ T6460] device bridge_slave_1 entered promiscuous mode [ 2955.471402][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2955.480409][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2955.489088][ T3803] bridge0: port 2(bridge_slave_1) entered blocking state [ 2955.496133][ T3803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2955.504066][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2955.512977][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2955.521998][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2955.530791][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2955.539614][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2955.548400][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2955.557065][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2955.566074][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2955.574292][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2955.582593][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2955.591573][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2955.600603][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2955.608695][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2955.628981][ T6460] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2955.643287][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2955.651919][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2955.660481][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2955.669228][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2955.678221][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2955.686759][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2955.696980][ T6454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2955.710409][ T6460] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2955.729886][ T6460] team0: Port device team_slave_0 added [ 2955.735621][ T6456] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2955.747358][ T6456] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2955.755681][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2955.764098][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2955.963122][ T6460] team0: Port device team_slave_1 added [ 2956.030176][ T6460] device hsr_slave_0 entered promiscuous mode [ 2956.068294][ T6460] device hsr_slave_1 entered promiscuous mode [ 2956.107929][ T6460] debugfs: Directory 'hsr0' with parent '/' already present! [ 2956.215765][ T6456] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2956.229264][ T6454] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2956.244145][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2956.251851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2956.259717][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2956.267119][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2956.526163][ T6460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2956.538065][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2956.545999][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2956.556302][ T6460] 8021q: adding VLAN 0 to HW filter on device team0 [ 2956.727849][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2956.744962][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2956.760085][ T5609] bridge0: port 1(bridge_slave_0) entered blocking state [ 2956.767163][ T5609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2956.786626][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2956.801452][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2956.816107][ T5609] bridge0: port 2(bridge_slave_1) entered blocking state [ 2956.823255][ T5609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2956.842809][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2956.856144][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2957.057254][ T6460] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2957.068068][ T6460] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2957.080569][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2957.088586][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2957.097128][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2957.105987][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2957.114554][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2957.123572][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2957.132152][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2957.140917][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2957.149635][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2957.159010][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2957.166999][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2957.295916][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2957.303743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2957.315295][ T6460] 8021q: adding VLAN 0 to HW filter on device batadv0 07:57:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:08 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x6, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) [ 2957.709213][ T5180] device bridge_slave_1 left promiscuous mode [ 2957.719211][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2957.789657][ T5180] device bridge_slave_0 left promiscuous mode [ 2957.799438][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2957.991308][ T5180] device bridge_slave_1 left promiscuous mode [ 2958.006564][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2958.088409][ T5180] device bridge_slave_0 left promiscuous mode [ 2958.094634][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2958.172728][ T5180] device bridge_slave_1 left promiscuous mode [ 2958.179060][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2958.228586][ T5180] device bridge_slave_0 left promiscuous mode [ 2958.236022][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2958.289080][ T5180] device bridge_slave_1 left promiscuous mode [ 2958.297486][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2958.352800][ T5180] device bridge_slave_0 left promiscuous mode [ 2958.360218][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state 07:57:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) 07:57:09 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) 07:57:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2962.258140][ T5180] device hsr_slave_0 left promiscuous mode [ 2962.337904][ T5180] device hsr_slave_1 left promiscuous mode [ 2962.403839][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2962.414870][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2962.425184][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2962.471441][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2962.549027][ T5180] bond0 (unregistering): Released all slaves [ 2962.698135][ T5180] device hsr_slave_0 left promiscuous mode [ 2962.738127][ T5180] device hsr_slave_1 left promiscuous mode [ 2962.785022][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2962.795236][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2962.805519][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2962.850922][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2962.947280][ T5180] bond0 (unregistering): Released all slaves [ 2963.078122][ T5180] device hsr_slave_0 left promiscuous mode [ 2963.148138][ T5180] device hsr_slave_1 left promiscuous mode [ 2963.204771][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2963.215758][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2963.226139][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2963.261722][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2963.329091][ T5180] bond0 (unregistering): Released all slaves [ 2963.478116][ T5180] device hsr_slave_0 left promiscuous mode [ 2963.517885][ T5180] device hsr_slave_1 left promiscuous mode [ 2963.564388][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2963.574538][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2963.585014][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2963.641513][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2963.708005][ T5180] bond0 (unregistering): Released all slaves [ 2963.998197][ T6530] IPVS: ftp: loaded support on port[0] = 21 [ 2964.002277][ T6522] IPVS: ftp: loaded support on port[0] = 21 07:57:14 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2964.237669][ T6530] chnl_net:caif_netlink_parms(): no params data found [ 2964.251369][ T6522] chnl_net:caif_netlink_parms(): no params data found [ 2964.294241][ T6530] bridge0: port 1(bridge_slave_0) entered blocking state [ 2964.301421][ T6530] bridge0: port 1(bridge_slave_0) entered disabled state [ 2964.309432][ T6530] device bridge_slave_0 entered promiscuous mode [ 2964.317059][ T6530] bridge0: port 2(bridge_slave_1) entered blocking state [ 2964.324486][ T6530] bridge0: port 2(bridge_slave_1) entered disabled state [ 2964.332409][ T6530] device bridge_slave_1 entered promiscuous mode [ 2964.347584][ T6522] bridge0: port 1(bridge_slave_0) entered blocking state [ 2964.355644][ T6522] bridge0: port 1(bridge_slave_0) entered disabled state [ 2964.363443][ T6522] device bridge_slave_0 entered promiscuous mode [ 2964.374928][ T6522] bridge0: port 2(bridge_slave_1) entered blocking state [ 2964.382129][ T6522] bridge0: port 2(bridge_slave_1) entered disabled state [ 2964.389836][ T6522] device bridge_slave_1 entered promiscuous mode [ 2964.406847][ T6530] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2964.419486][ T6522] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2964.430262][ T6522] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2964.441173][ T6530] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2964.471025][ T6522] team0: Port device team_slave_0 added [ 2964.477891][ T6522] team0: Port device team_slave_1 added [ 2964.484382][ T6530] team0: Port device team_slave_0 added [ 2964.529538][ T6530] team0: Port device team_slave_1 added [ 2964.750124][ T6522] device hsr_slave_0 entered promiscuous mode [ 2964.808206][ T6522] device hsr_slave_1 entered promiscuous mode [ 2964.857862][ T6522] debugfs: Directory 'hsr0' with parent '/' already present! [ 2964.930203][ T6530] device hsr_slave_0 entered promiscuous mode [ 2964.988511][ T6530] device hsr_slave_1 entered promiscuous mode [ 2965.057945][ T6530] debugfs: Directory 'hsr0' with parent '/' already present! [ 2965.123885][ T6522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2965.137552][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2965.145843][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2965.159499][ T6522] 8021q: adding VLAN 0 to HW filter on device team0 [ 2965.172194][ T6530] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2965.182893][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2965.192611][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2965.201173][T26081] bridge0: port 1(bridge_slave_0) entered blocking state [ 2965.208281][T26081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2965.216675][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2965.227013][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2965.235786][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2965.244592][T26317] bridge0: port 2(bridge_slave_1) entered blocking state [ 2965.251642][T26317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2965.273856][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2965.283330][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2965.294380][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2965.303487][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2965.312654][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2965.321829][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2965.331252][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2965.339864][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2965.348594][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2965.356379][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2965.364303][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2965.374274][ T6530] 8021q: adding VLAN 0 to HW filter on device team0 [ 2965.384078][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2965.392972][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2965.409264][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2965.418633][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2965.427008][ T5609] bridge0: port 1(bridge_slave_0) entered blocking state [ 2965.434084][ T5609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2965.442266][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2965.451045][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2965.459468][ T5609] bridge0: port 2(bridge_slave_1) entered blocking state [ 2965.466477][ T5609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2965.474265][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2965.483381][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2965.492651][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2965.502091][ T6522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2965.515768][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2965.524831][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2965.540922][ T6530] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2965.551729][ T6530] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2965.566320][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2965.574877][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2965.583906][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2965.593763][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2965.602144][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2965.610800][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2965.619286][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2965.628243][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2965.643642][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2965.651557][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2965.659305][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2965.666652][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2965.684567][ T6522] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2965.695846][ T6530] 8021q: adding VLAN 0 to HW filter on device batadv0 07:57:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) [ 2969.382719][ T6566] IPVS: ftp: loaded support on port[0] = 21 [ 2969.685124][ T6566] chnl_net:caif_netlink_parms(): no params data found [ 2969.799577][ T6566] bridge0: port 1(bridge_slave_0) entered blocking state [ 2969.806642][ T6566] bridge0: port 1(bridge_slave_0) entered disabled state [ 2969.817312][ T6566] device bridge_slave_0 entered promiscuous mode [ 2969.825020][ T6566] bridge0: port 2(bridge_slave_1) entered blocking state [ 2969.832176][ T6566] bridge0: port 2(bridge_slave_1) entered disabled state [ 2969.839892][ T6566] device bridge_slave_1 entered promiscuous mode [ 2969.855361][ T5180] device bridge_slave_1 left promiscuous mode [ 2969.864666][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2969.912133][ T5180] device bridge_slave_0 left promiscuous mode [ 2969.919484][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2969.999281][ T5180] device bridge_slave_1 left promiscuous mode [ 2970.005607][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2970.088446][ T5180] device bridge_slave_0 left promiscuous mode [ 2970.094624][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2970.128917][ T5180] device bridge_slave_1 left promiscuous mode [ 2970.135114][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2970.168433][ T5180] device bridge_slave_0 left promiscuous mode [ 2970.174620][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2970.219465][ T5180] device bridge_slave_1 left promiscuous mode [ 2970.225633][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2970.278542][ T5180] device bridge_slave_0 left promiscuous mode [ 2970.284793][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2972.778106][ T5180] device hsr_slave_0 left promiscuous mode [ 2972.817970][ T5180] device hsr_slave_1 left promiscuous mode [ 2972.865062][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2972.875313][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2972.885430][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2972.921642][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2972.998248][ T5180] bond0 (unregistering): Released all slaves [ 2973.138143][ T5180] device hsr_slave_0 left promiscuous mode [ 2973.177982][ T5180] device hsr_slave_1 left promiscuous mode [ 2973.224363][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2973.234585][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2973.244954][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2973.281607][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2973.359245][ T5180] bond0 (unregistering): Released all slaves [ 2973.518161][ T5180] device hsr_slave_0 left promiscuous mode [ 2973.567870][ T5180] device hsr_slave_1 left promiscuous mode [ 2973.624288][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2973.634897][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2973.644951][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2973.683765][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2973.758192][ T5180] bond0 (unregistering): Released all slaves [ 2973.918212][ T5180] device hsr_slave_0 left promiscuous mode [ 2973.987912][ T5180] device hsr_slave_1 left promiscuous mode [ 2974.034200][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2974.044296][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2974.054250][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2974.111303][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2974.187695][ T5180] bond0 (unregistering): Released all slaves [ 2974.281874][ T6566] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2974.297702][ T6573] IPVS: ftp: loaded support on port[0] = 21 [ 2974.297710][ T6572] IPVS: ftp: loaded support on port[0] = 21 [ 2974.303124][ T6574] IPVS: ftp: loaded support on port[0] = 21 [ 2974.312956][ T6577] IPVS: ftp: loaded support on port[0] = 21 [ 2974.323580][ T6575] IPVS: ftp: loaded support on port[0] = 21 [ 2974.332478][ T6566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2974.410550][ T6566] team0: Port device team_slave_0 added [ 2974.447120][ T6566] team0: Port device team_slave_1 added [ 2974.520193][ T6566] device hsr_slave_0 entered promiscuous mode [ 2974.578208][ T6566] device hsr_slave_1 entered promiscuous mode [ 2974.747084][ T6573] chnl_net:caif_netlink_parms(): no params data found [ 2974.760237][ T6575] chnl_net:caif_netlink_parms(): no params data found [ 2974.768946][ T6574] chnl_net:caif_netlink_parms(): no params data found [ 2974.782319][ T6577] chnl_net:caif_netlink_parms(): no params data found [ 2974.823589][ T6572] chnl_net:caif_netlink_parms(): no params data found [ 2974.871694][ T6573] bridge0: port 1(bridge_slave_0) entered blocking state [ 2974.878994][ T6573] bridge0: port 1(bridge_slave_0) entered disabled state [ 2974.887532][ T6573] device bridge_slave_0 entered promiscuous mode [ 2974.914069][ T6575] bridge0: port 1(bridge_slave_0) entered blocking state [ 2974.921261][ T6575] bridge0: port 1(bridge_slave_0) entered disabled state [ 2974.928976][ T6575] device bridge_slave_0 entered promiscuous mode [ 2974.940933][ T6575] bridge0: port 2(bridge_slave_1) entered blocking state [ 2974.948390][ T6575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2974.956235][ T6575] device bridge_slave_1 entered promiscuous mode [ 2974.963755][ T6573] bridge0: port 2(bridge_slave_1) entered blocking state [ 2974.970965][ T6573] bridge0: port 2(bridge_slave_1) entered disabled state [ 2974.978865][ T6573] device bridge_slave_1 entered promiscuous mode [ 2974.993355][ T6572] bridge0: port 1(bridge_slave_0) entered blocking state [ 2975.000516][ T6572] bridge0: port 1(bridge_slave_0) entered disabled state [ 2975.008413][ T6572] device bridge_slave_0 entered promiscuous mode [ 2975.015540][ T6574] bridge0: port 1(bridge_slave_0) entered blocking state [ 2975.023091][ T6574] bridge0: port 1(bridge_slave_0) entered disabled state [ 2975.031052][ T6574] device bridge_slave_0 entered promiscuous mode [ 2975.042371][ T6574] bridge0: port 2(bridge_slave_1) entered blocking state [ 2975.049478][ T6574] bridge0: port 2(bridge_slave_1) entered disabled state [ 2975.057267][ T6574] device bridge_slave_1 entered promiscuous mode [ 2975.085406][ T6577] bridge0: port 1(bridge_slave_0) entered blocking state [ 2975.092506][ T6577] bridge0: port 1(bridge_slave_0) entered disabled state [ 2975.100584][ T6577] device bridge_slave_0 entered promiscuous mode [ 2975.108001][ T6577] bridge0: port 2(bridge_slave_1) entered blocking state [ 2975.115069][ T6577] bridge0: port 2(bridge_slave_1) entered disabled state [ 2975.122902][ T6577] device bridge_slave_1 entered promiscuous mode [ 2975.129966][ T6572] bridge0: port 2(bridge_slave_1) entered blocking state [ 2975.137024][ T6572] bridge0: port 2(bridge_slave_1) entered disabled state [ 2975.144875][ T6572] device bridge_slave_1 entered promiscuous mode [ 2975.157209][ T6574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2975.168791][ T6574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2975.329468][ T6575] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2975.345053][ T6573] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2975.364750][ T6577] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2975.423844][ T6575] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2975.435019][ T6573] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2975.449347][ T6572] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2975.459727][ T6577] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2975.471026][ T6574] team0: Port device team_slave_0 added [ 2975.479320][ T6566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2975.503336][ T6572] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2975.518046][ T6574] team0: Port device team_slave_1 added [ 2975.531766][ T6566] 8021q: adding VLAN 0 to HW filter on device team0 [ 2975.539910][ T6575] team0: Port device team_slave_0 added [ 2975.546378][ T6573] team0: Port device team_slave_0 added [ 2975.562771][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2975.570995][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2975.598628][ T6575] team0: Port device team_slave_1 added [ 2975.605201][ T6573] team0: Port device team_slave_1 added [ 2975.617664][ T6577] team0: Port device team_slave_0 added [ 2975.634369][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2975.648487][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2975.656955][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 2975.664142][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2975.677272][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2975.685945][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2975.698709][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 2975.705843][ T9029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2975.718411][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2975.727309][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2975.740372][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2975.751367][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2975.762014][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2975.773559][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2975.791798][ T6572] team0: Port device team_slave_0 added [ 2975.850170][ T6574] device hsr_slave_0 entered promiscuous mode [ 2975.898352][ T6574] device hsr_slave_1 entered promiscuous mode [ 2975.937898][ T6574] debugfs: Directory 'hsr0' with parent '/' already present! [ 2975.946206][ T6577] team0: Port device team_slave_1 added [ 2975.952704][ T6566] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2975.963428][ T6566] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2975.975990][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2975.984704][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2975.992899][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2976.001462][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2976.010100][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2976.018623][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2976.028057][ T6572] team0: Port device team_slave_1 added [ 2976.063685][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2976.120348][ T6573] device hsr_slave_0 entered promiscuous mode [ 2976.158383][ T6573] device hsr_slave_1 entered promiscuous mode [ 2976.197906][ T6573] debugfs: Directory 'hsr0' with parent '/' already present! [ 2976.240134][ T6575] device hsr_slave_0 entered promiscuous mode [ 2976.278364][ T6575] device hsr_slave_1 entered promiscuous mode [ 2976.318057][ T6575] debugfs: Directory 'hsr0' with parent '/' already present! [ 2976.359814][ T6577] device hsr_slave_0 entered promiscuous mode [ 2976.418158][ T6577] device hsr_slave_1 entered promiscuous mode [ 2976.458007][ T6577] debugfs: Directory 'hsr0' with parent '/' already present! [ 2976.519959][ T6572] device hsr_slave_0 entered promiscuous mode [ 2976.568317][ T6572] device hsr_slave_1 entered promiscuous mode [ 2976.637923][ T6572] debugfs: Directory 'hsr0' with parent '/' already present! [ 2976.671534][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2976.679269][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2976.715783][ T6566] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2976.767239][ T6574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2976.815553][ T6574] 8021q: adding VLAN 0 to HW filter on device team0 [ 2976.839523][ T6572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2976.846735][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2976.855289][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2976.870848][ T6573] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2976.887983][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2976.896693][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2976.906098][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 2976.913188][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2976.921782][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2976.930825][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2976.939787][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 2976.946821][ T9029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2976.954947][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2976.971495][ T6577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2976.984619][ T6573] 8021q: adding VLAN 0 to HW filter on device team0 [ 2977.015556][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2977.028570][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2977.036468][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2977.046552][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2977.056176][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2977.070025][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2977.079133][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2977.087667][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2977.096441][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2977.104670][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2977.113102][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2977.120908][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2977.136457][ T6577] 8021q: adding VLAN 0 to HW filter on device team0 [ 2977.145581][ T6572] 8021q: adding VLAN 0 to HW filter on device team0 [ 2977.160108][ T6575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2977.167153][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2977.179269][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2977.201354][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2977.219456][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2977.228288][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2977.236941][ T5609] bridge0: port 1(bridge_slave_0) entered blocking state [ 2977.244114][ T5609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2977.252590][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2977.271682][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2977.281058][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2977.290261][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 2977.297361][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2977.305568][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2977.314576][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2977.323613][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 2977.330815][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2977.339300][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2977.348768][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2977.357511][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2977.368488][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 2977.375544][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2977.386425][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2977.394748][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2977.403391][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2977.412663][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2977.426939][ T6575] 8021q: adding VLAN 0 to HW filter on device team0 [ 2977.445357][ T6574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2977.458804][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2977.466791][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2977.476287][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2977.485876][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2977.496414][ T5269] bridge0: port 2(bridge_slave_1) entered blocking state [ 2977.503484][ T5269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2977.512334][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2977.522307][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2977.532241][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2977.541424][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2977.550576][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2977.559755][ T5269] bridge0: port 2(bridge_slave_1) entered blocking state [ 2977.566811][ T5269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2977.575009][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2977.584621][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2977.622373][ T6573] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2977.633596][ T6573] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2977.647743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2977.656505][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2977.665002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2977.674641][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2977.683346][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2977.692092][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2977.700691][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 2977.707723][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2977.715652][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2977.724610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2977.733171][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 2977.740368][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2977.748740][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2977.757672][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2977.766766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2977.775491][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2977.784144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2977.793071][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2977.802074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2977.809630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2977.817032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2977.825699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2977.833995][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2977.843088][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2977.851773][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2977.860834][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2977.868654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2977.876668][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2977.901270][ T6577] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2977.920467][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2977.932752][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2977.941721][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2977.952803][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2977.961662][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2977.970383][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2977.979076][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2977.987524][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2977.996045][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2978.004597][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2978.013027][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2978.022045][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2978.031636][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2978.040466][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2978.062679][ T6572] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2978.074090][ T6572] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2978.086785][ T6574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2978.103096][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2978.111837][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2978.120196][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 07:57:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2978.129976][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2978.138666][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2978.147260][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2978.155733][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2978.164395][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2978.193407][ T6575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2978.216611][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2978.224695][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2978.232470][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2978.240059][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2978.247558][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2978.255151][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2978.266103][ T6573] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2978.278424][ T6577] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2978.290062][ T6572] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2978.386609][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2978.394393][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2978.407623][ T6575] 8021q: adding VLAN 0 to HW filter on device batadv0 07:57:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {0xffffffffffffffff, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) 07:57:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) fstat(0xffffffffffffffff, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) fstat(0xffffffffffffffff, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) fstat(0xffffffffffffffff, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2981.198735][ T5180] device bridge_slave_1 left promiscuous mode [ 2981.205145][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2981.302707][ T5180] device bridge_slave_0 left promiscuous mode [ 2981.322291][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2981.369457][ T5180] device bridge_slave_1 left promiscuous mode [ 2981.381241][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2981.441456][ T5180] device bridge_slave_0 left promiscuous mode [ 2981.457969][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2983.288124][ T5180] device hsr_slave_0 left promiscuous mode [ 2983.367994][ T5180] device hsr_slave_1 left promiscuous mode [ 2983.414869][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2983.425694][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2983.436051][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2983.491898][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2983.575688][ T5180] bond0 (unregistering): Released all slaves [ 2983.698385][ T5180] device hsr_slave_0 left promiscuous mode [ 2983.767974][ T5180] device hsr_slave_1 left promiscuous mode [ 2983.814647][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2983.825508][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2983.835734][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2983.872734][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2983.960316][ T5180] bond0 (unregistering): Released all slaves [ 2984.140332][ T6678] IPVS: ftp: loaded support on port[0] = 21 [ 2984.142959][ T6682] IPVS: ftp: loaded support on port[0] = 21 [ 2984.155372][ T6676] IPVS: ftp: loaded support on port[0] = 21 [ 2984.162023][ T6681] IPVS: ftp: loaded support on port[0] = 21 [ 2984.472563][ T6678] chnl_net:caif_netlink_parms(): no params data found [ 2984.520875][ T6681] chnl_net:caif_netlink_parms(): no params data found [ 2984.539341][ T6676] chnl_net:caif_netlink_parms(): no params data found [ 2984.551890][ T6682] chnl_net:caif_netlink_parms(): no params data found [ 2984.606939][ T6678] bridge0: port 1(bridge_slave_0) entered blocking state [ 2984.614487][ T6678] bridge0: port 1(bridge_slave_0) entered disabled state [ 2984.622884][ T6678] device bridge_slave_0 entered promiscuous mode [ 2984.642157][ T6681] bridge0: port 1(bridge_slave_0) entered blocking state [ 2984.649391][ T6681] bridge0: port 1(bridge_slave_0) entered disabled state [ 2984.657123][ T6681] device bridge_slave_0 entered promiscuous mode [ 2984.671699][ T6678] bridge0: port 2(bridge_slave_1) entered blocking state [ 2984.680901][ T6678] bridge0: port 2(bridge_slave_1) entered disabled state [ 2984.691820][ T6678] device bridge_slave_1 entered promiscuous mode [ 2984.700786][ T6682] bridge0: port 1(bridge_slave_0) entered blocking state [ 2984.722345][ T6682] bridge0: port 1(bridge_slave_0) entered disabled state [ 2984.730781][ T6682] device bridge_slave_0 entered promiscuous mode [ 2984.738361][ T6681] bridge0: port 2(bridge_slave_1) entered blocking state [ 2984.745384][ T6681] bridge0: port 2(bridge_slave_1) entered disabled state [ 2984.759260][ T6681] device bridge_slave_1 entered promiscuous mode [ 2984.780515][ T6676] bridge0: port 1(bridge_slave_0) entered blocking state [ 2984.787573][ T6676] bridge0: port 1(bridge_slave_0) entered disabled state [ 2984.795816][ T6676] device bridge_slave_0 entered promiscuous mode [ 2984.803684][ T6682] bridge0: port 2(bridge_slave_1) entered blocking state [ 2984.811075][ T6682] bridge0: port 2(bridge_slave_1) entered disabled state [ 2984.819046][ T6682] device bridge_slave_1 entered promiscuous mode [ 2984.835182][ T6676] bridge0: port 2(bridge_slave_1) entered blocking state [ 2984.852371][ T6676] bridge0: port 2(bridge_slave_1) entered disabled state [ 2984.861161][ T6676] device bridge_slave_1 entered promiscuous mode [ 2984.884681][ T6678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2984.910157][ T6681] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2984.926097][ T6681] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2984.939363][ T6678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2984.950267][ T6682] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2984.961536][ T6676] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2984.985434][ T6682] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2984.999543][ T6676] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2985.033074][ T6676] team0: Port device team_slave_0 added [ 2985.039472][ T6681] team0: Port device team_slave_0 added [ 2985.045952][ T6678] team0: Port device team_slave_0 added [ 2985.053264][ T6678] team0: Port device team_slave_1 added [ 2985.065117][ T6676] team0: Port device team_slave_1 added [ 2985.072009][ T6681] team0: Port device team_slave_1 added [ 2985.081868][ T6682] team0: Port device team_slave_0 added [ 2985.098676][ T6682] team0: Port device team_slave_1 added [ 2985.159743][ T6678] device hsr_slave_0 entered promiscuous mode [ 2985.198322][ T6678] device hsr_slave_1 entered promiscuous mode [ 2985.237955][ T6678] debugfs: Directory 'hsr0' with parent '/' already present! [ 2985.319708][ T6676] device hsr_slave_0 entered promiscuous mode [ 2985.368439][ T6676] device hsr_slave_1 entered promiscuous mode [ 2985.407879][ T6676] debugfs: Directory 'hsr0' with parent '/' already present! [ 2985.480428][ T6681] device hsr_slave_0 entered promiscuous mode [ 2985.538402][ T6681] device hsr_slave_1 entered promiscuous mode [ 2985.577906][ T6681] debugfs: Directory 'hsr0' with parent '/' already present! [ 2985.640471][ T6682] device hsr_slave_0 entered promiscuous mode [ 2985.708382][ T6682] device hsr_slave_1 entered promiscuous mode [ 2985.778375][ T6682] debugfs: Directory 'hsr0' with parent '/' already present! [ 2985.869062][ T6678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2985.891762][ T6682] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2985.912671][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2985.920837][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2985.941072][ T6678] 8021q: adding VLAN 0 to HW filter on device team0 [ 2985.955833][ T6676] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2985.963981][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2985.976298][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2985.987904][ T6681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2985.999063][ T6682] 8021q: adding VLAN 0 to HW filter on device team0 [ 2986.011187][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2986.020091][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2986.028706][ T5269] bridge0: port 1(bridge_slave_0) entered blocking state [ 2986.035733][ T5269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2986.043866][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2986.065818][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2986.074729][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2986.083552][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 2986.090688][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2986.098727][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2986.107825][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2986.116722][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2986.124726][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2986.132613][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2986.141314][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2986.149909][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 2986.156975][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2986.166306][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2986.174662][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2986.183819][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2986.195715][ T6681] 8021q: adding VLAN 0 to HW filter on device team0 [ 2986.448095][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2986.456240][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2986.464116][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2986.472244][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2986.484912][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2986.493331][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 2986.500429][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2986.508414][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2986.516962][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2986.525685][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2986.534629][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2986.543066][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2986.551472][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2986.560359][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2986.569055][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2986.590015][ T6678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2986.599859][ T6676] 8021q: adding VLAN 0 to HW filter on device team0 [ 2986.607259][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2986.616348][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2986.624912][ T5609] bridge0: port 1(bridge_slave_0) entered blocking state [ 2986.631945][ T5609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2986.640299][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2986.649289][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2986.657636][ T5609] bridge0: port 2(bridge_slave_1) entered blocking state [ 2986.664772][ T5609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2986.672799][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2986.681887][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2986.690569][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2986.699465][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2986.709053][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2986.717831][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2986.856816][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2986.865565][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2986.874613][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2986.883495][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2986.892064][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 2986.899127][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2986.906899][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2986.916258][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2986.925010][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2986.933641][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2986.942357][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2986.950900][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2986.959391][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2986.968122][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2986.976498][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 2986.983630][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2986.992519][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2987.000606][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2987.143148][ T6682] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2987.154275][ T6682] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2987.166302][ T6681] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2987.178522][ T6681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2987.190575][ T6678] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2987.198462][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2987.206038][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2987.213650][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2987.222845][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2987.231677][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2987.240275][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2987.250075][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2987.258773][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2987.267548][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2987.276040][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2987.284695][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2987.293536][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2987.302760][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2987.310771][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2987.463040][ T6681] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2987.477620][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2987.486807][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2987.504330][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2987.517438][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2987.525064][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2987.533574][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2987.542032][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2987.549640][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2987.561449][ T6676] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2987.573784][ T6676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2987.585218][ T6682] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2987.719776][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2987.733221][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2987.759070][ T6676] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2987.931192][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2987.939014][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2989.063391][ T5180] device bridge_slave_1 left promiscuous mode [ 2989.069829][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2989.118572][ T5180] device bridge_slave_0 left promiscuous mode [ 2989.124924][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2989.179646][ T5180] device bridge_slave_1 left promiscuous mode [ 2989.185984][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2989.228555][ T5180] device bridge_slave_0 left promiscuous mode [ 2989.235113][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2989.269049][ T5180] device bridge_slave_1 left promiscuous mode [ 2989.275209][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2989.338644][ T5180] device bridge_slave_0 left promiscuous mode [ 2989.344912][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2989.399229][ T5180] device bridge_slave_1 left promiscuous mode [ 2989.405392][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state 07:57:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f0000000040)="66b9800000c00f326635010000000f30260fd18300000fc72a0faef7da20d9c7f30f2a8a00000f01cabaf80c66b8d1d2f18a66efbafc0cec2e2ef30f7f708b", 0x3f}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d0]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:57:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {0xffffffffffffffff, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) 07:57:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2989.448593][ T5180] device bridge_slave_0 left promiscuous mode [ 2989.454842][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2989.499381][ T5180] device bridge_slave_1 left promiscuous mode [ 2989.510944][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2989.571852][ T5180] device bridge_slave_0 left promiscuous mode [ 2989.586414][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state 07:57:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2993.638075][ T5180] device hsr_slave_0 left promiscuous mode [ 2993.697899][ T5180] device hsr_slave_1 left promiscuous mode [ 2993.744333][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2993.754742][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2993.765103][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2993.831715][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2993.910867][ T5180] bond0 (unregistering): Released all slaves [ 2994.048149][ T5180] device hsr_slave_0 left promiscuous mode [ 2994.118012][ T5180] device hsr_slave_1 left promiscuous mode [ 2994.174687][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2994.185027][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2994.195839][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2994.251809][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2994.341824][ T5180] bond0 (unregistering): Released all slaves [ 2994.468089][ T5180] device hsr_slave_0 left promiscuous mode [ 2994.528066][ T5180] device hsr_slave_1 left promiscuous mode [ 2994.595241][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2994.606160][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2994.616459][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2994.651464][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2994.748892][ T5180] bond0 (unregistering): Released all slaves [ 2994.898122][ T5180] device hsr_slave_0 left promiscuous mode [ 2994.938056][ T5180] device hsr_slave_1 left promiscuous mode [ 2995.004232][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2995.016113][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2995.025970][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2995.072237][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2995.149256][ T5180] bond0 (unregistering): Released all slaves [ 2995.328145][ T5180] device hsr_slave_0 left promiscuous mode [ 2995.367921][ T5180] device hsr_slave_1 left promiscuous mode [ 2995.414496][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 2995.424944][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 2995.435633][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2995.501164][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2995.558501][ T5180] bond0 (unregistering): Released all slaves 07:57:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0000001500000000000040050000a90000e7fc4b83bbb6a23b4b6942b7872401000000000000002560e1f0bc"]) 07:57:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) close(r0) 07:57:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2996.187394][ T6748] IPVS: ftp: loaded support on port[0] = 21 [ 2996.425920][ T6748] chnl_net:caif_netlink_parms(): no params data found [ 2996.459620][ T6748] bridge0: port 1(bridge_slave_0) entered blocking state [ 2996.466759][ T6748] bridge0: port 1(bridge_slave_0) entered disabled state [ 2996.477513][ T6748] device bridge_slave_0 entered promiscuous mode [ 2996.557943][ T6748] bridge0: port 2(bridge_slave_1) entered blocking state [ 2996.565557][ T6748] bridge0: port 2(bridge_slave_1) entered disabled state [ 2996.576483][ T6748] device bridge_slave_1 entered promiscuous mode [ 2996.704800][ T6748] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2996.718641][ T6748] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2996.741342][ T6748] team0: Port device team_slave_0 added [ 2996.751362][ T6748] team0: Port device team_slave_1 added [ 2996.839802][ T6748] device hsr_slave_0 entered promiscuous mode [ 2996.928203][ T6748] device hsr_slave_1 entered promiscuous mode [ 2997.004480][ T6748] bridge0: port 2(bridge_slave_1) entered blocking state [ 2997.011579][ T6748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2997.018978][ T6748] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.026129][ T6748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2997.034872][ T5608] bridge0: port 1(bridge_slave_0) entered disabled state [ 2997.043286][ T5608] bridge0: port 2(bridge_slave_1) entered disabled state [ 2997.076406][ T6748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2997.087234][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2997.095165][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2997.104850][ T6748] 8021q: adding VLAN 0 to HW filter on device team0 [ 2997.113860][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2997.122713][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2997.130999][ T3803] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.138039][ T3803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2997.151659][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2997.160481][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2997.169204][T26317] bridge0: port 2(bridge_slave_1) entered blocking state [ 2997.176237][T26317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2997.184189][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2997.197852][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2997.206923][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2997.216013][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2997.225905][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2997.234142][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2997.243008][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2997.256229][ T6748] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2997.266930][ T6748] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2997.278541][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2997.287127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2997.295947][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2997.304411][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2997.312909][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2997.327289][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2997.335064][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2997.345713][ T6748] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2997.861432][ T6763] IPVS: ftp: loaded support on port[0] = 21 [ 2997.943127][ T6763] chnl_net:caif_netlink_parms(): no params data found [ 2997.974074][ T6763] bridge0: port 1(bridge_slave_0) entered blocking state [ 2997.981349][ T6763] bridge0: port 1(bridge_slave_0) entered disabled state [ 2997.989739][ T6763] device bridge_slave_0 entered promiscuous mode [ 2997.998215][ T6763] bridge0: port 2(bridge_slave_1) entered blocking state [ 2998.005305][ T6763] bridge0: port 2(bridge_slave_1) entered disabled state [ 2998.013437][ T6763] device bridge_slave_1 entered promiscuous mode [ 2998.033670][ T6763] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2998.045390][ T6763] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2998.069305][ T6763] team0: Port device team_slave_0 added [ 2998.076434][ T6763] team0: Port device team_slave_1 added [ 2998.149767][ T6763] device hsr_slave_0 entered promiscuous mode [ 2998.198208][ T6763] device hsr_slave_1 entered promiscuous mode [ 2998.237881][ T6763] debugfs: Directory 'hsr0' with parent '/' already present! [ 2998.278415][ T6763] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2998.291812][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2998.300348][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2998.310014][ T6763] 8021q: adding VLAN 0 to HW filter on device team0 [ 2998.320093][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2998.328961][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2998.337351][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 2998.344420][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2998.352687][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2998.369885][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 07:57:49 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2100, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 07:57:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:57:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:57:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2998.379455][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2998.388309][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 2998.395345][ T7916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2998.411436][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2998.429720][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2998.482643][ T3909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2998.498933][ T3909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2998.531999][ T3909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2998.545618][ T6763] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2998.557641][ T6763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2998.569562][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2998.579278][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:57:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000002c0)) ptrace(0x10, r0) [ 2998.741870][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2998.758235][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2998.779561][ T6763] 8021q: adding VLAN 0 to HW filter on device batadv0 07:57:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002740)=""/4096, 0x1000}, {0x0}], 0x2}, 0x42) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) read(r2, &(0x7f0000000000)=""/44, 0x2c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) shutdown(0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 07:57:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002740)=""/4096, 0x1000}, {0x0}], 0x2}, 0x42) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) read(r2, &(0x7f0000000000)=""/44, 0x2c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/229, 0xe5}], 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r6, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 07:57:50 executing program 2: 07:57:50 executing program 2: 07:57:50 executing program 2: 07:57:50 executing program 2: 07:57:50 executing program 2: [ 3000.453197][ T6788] IPVS: ftp: loaded support on port[0] = 21 [ 3000.626246][ T6788] chnl_net:caif_netlink_parms(): no params data found [ 3000.652177][ T6788] bridge0: port 1(bridge_slave_0) entered blocking state [ 3000.659459][ T6788] bridge0: port 1(bridge_slave_0) entered disabled state [ 3000.667146][ T6788] device bridge_slave_0 entered promiscuous mode [ 3000.795108][ T6788] bridge0: port 2(bridge_slave_1) entered blocking state [ 3000.802473][ T6788] bridge0: port 2(bridge_slave_1) entered disabled state [ 3000.810947][ T6788] device bridge_slave_1 entered promiscuous mode [ 3000.942876][ T6788] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3000.954268][ T6788] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3000.974143][ T6788] team0: Port device team_slave_0 added [ 3001.098877][ T6788] team0: Port device team_slave_1 added [ 3001.170345][ T6788] device hsr_slave_0 entered promiscuous mode [ 3001.208275][ T6788] device hsr_slave_1 entered promiscuous mode [ 3001.257846][ T6788] debugfs: Directory 'hsr0' with parent '/' already present! [ 3001.508952][ T6794] IPVS: ftp: loaded support on port[0] = 21 [ 3001.511978][ T6788] bridge0: port 2(bridge_slave_1) entered blocking state [ 3001.522049][ T6788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3001.529324][ T6788] bridge0: port 1(bridge_slave_0) entered blocking state [ 3001.536330][ T6788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3001.554028][ T6795] IPVS: ftp: loaded support on port[0] = 21 [ 3001.554283][ T6796] IPVS: ftp: loaded support on port[0] = 21 [ 3001.569408][ T5180] device bridge_slave_1 left promiscuous mode [ 3001.572137][ T6797] IPVS: ftp: loaded support on port[0] = 21 [ 3001.575601][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3001.628750][ T5180] device bridge_slave_0 left promiscuous mode [ 3001.635006][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3001.698953][ T5180] device bridge_slave_1 left promiscuous mode [ 3001.705248][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3001.768360][ T5180] device bridge_slave_0 left promiscuous mode [ 3001.774600][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3001.819174][ T5180] device bridge_slave_1 left promiscuous mode [ 3001.825502][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3001.868543][ T5180] device bridge_slave_0 left promiscuous mode [ 3001.874707][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3001.929599][ T5180] device bridge_slave_1 left promiscuous mode [ 3001.935814][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3001.988517][ T5180] device bridge_slave_0 left promiscuous mode [ 3001.994772][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3002.059289][ T5180] device bridge_slave_1 left promiscuous mode [ 3002.065565][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3002.128502][ T5180] device bridge_slave_0 left promiscuous mode [ 3002.134715][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3005.228064][ T5180] device hsr_slave_0 left promiscuous mode [ 3005.277934][ T5180] device hsr_slave_1 left promiscuous mode [ 3005.323868][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3005.334105][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3005.344197][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3005.391158][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3005.468133][ T5180] bond0 (unregistering): Released all slaves [ 3005.618073][ T5180] device hsr_slave_0 left promiscuous mode [ 3005.657912][ T5180] device hsr_slave_1 left promiscuous mode [ 3005.714923][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3005.725362][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3005.735555][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3005.791948][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3005.849611][ T5180] bond0 (unregistering): Released all slaves [ 3005.988389][ T5180] device hsr_slave_0 left promiscuous mode [ 3006.032013][ T5180] device hsr_slave_1 left promiscuous mode [ 3006.095216][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3006.105403][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3006.116199][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3006.172027][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3006.248546][ T5180] bond0 (unregistering): Released all slaves [ 3006.388157][ T5180] device hsr_slave_0 left promiscuous mode [ 3006.457920][ T5180] device hsr_slave_1 left promiscuous mode [ 3006.503521][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3006.514052][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3006.524244][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3006.561817][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3006.648381][ T5180] bond0 (unregistering): Released all slaves [ 3006.788176][ T5180] device hsr_slave_0 left promiscuous mode [ 3006.857857][ T5180] device hsr_slave_1 left promiscuous mode [ 3006.934117][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3006.944406][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3006.954590][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3006.992133][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3007.048764][ T5180] bond0 (unregistering): Released all slaves [ 3007.144035][ T5609] bridge0: port 1(bridge_slave_0) entered disabled state [ 3007.152190][ T5609] bridge0: port 2(bridge_slave_1) entered disabled state [ 3007.268401][ T6794] chnl_net:caif_netlink_parms(): no params data found [ 3007.319229][ T6796] chnl_net:caif_netlink_parms(): no params data found [ 3007.381073][ T6796] bridge0: port 1(bridge_slave_0) entered blocking state [ 3007.388418][ T6796] bridge0: port 1(bridge_slave_0) entered disabled state [ 3007.396114][ T6796] device bridge_slave_0 entered promiscuous mode [ 3007.410910][ T6794] bridge0: port 1(bridge_slave_0) entered blocking state [ 3007.418097][ T6794] bridge0: port 1(bridge_slave_0) entered disabled state [ 3007.425771][ T6794] device bridge_slave_0 entered promiscuous mode [ 3007.433602][ T6794] bridge0: port 2(bridge_slave_1) entered blocking state [ 3007.440716][ T6794] bridge0: port 2(bridge_slave_1) entered disabled state [ 3007.448646][ T6794] device bridge_slave_1 entered promiscuous mode [ 3007.463398][ T6796] bridge0: port 2(bridge_slave_1) entered blocking state [ 3007.470582][ T6796] bridge0: port 2(bridge_slave_1) entered disabled state [ 3007.478569][ T6796] device bridge_slave_1 entered promiscuous mode [ 3007.496621][ T6797] chnl_net:caif_netlink_parms(): no params data found [ 3007.521067][ T6795] chnl_net:caif_netlink_parms(): no params data found [ 3007.542781][ T6788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3007.554469][ T6794] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3007.565401][ T6794] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3007.583860][ T6796] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3007.612138][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3007.620033][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3007.647489][ T6797] bridge0: port 1(bridge_slave_0) entered blocking state [ 3007.654736][ T6797] bridge0: port 1(bridge_slave_0) entered disabled state [ 3007.662492][ T6797] device bridge_slave_0 entered promiscuous mode [ 3007.671169][ T6796] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3007.681907][ T6788] 8021q: adding VLAN 0 to HW filter on device team0 [ 3007.689978][ T6794] team0: Port device team_slave_0 added [ 3007.700447][ T6795] bridge0: port 1(bridge_slave_0) entered blocking state [ 3007.707502][ T6795] bridge0: port 1(bridge_slave_0) entered disabled state [ 3007.715538][ T6795] device bridge_slave_0 entered promiscuous mode [ 3007.722847][ T6797] bridge0: port 2(bridge_slave_1) entered blocking state [ 3007.729995][ T6797] bridge0: port 2(bridge_slave_1) entered disabled state [ 3007.737644][ T6797] device bridge_slave_1 entered promiscuous mode [ 3007.763670][ T6794] team0: Port device team_slave_1 added [ 3007.769861][ T6795] bridge0: port 2(bridge_slave_1) entered blocking state [ 3007.776949][ T6795] bridge0: port 2(bridge_slave_1) entered disabled state [ 3007.784793][ T6795] device bridge_slave_1 entered promiscuous mode [ 3007.792876][ T6796] team0: Port device team_slave_0 added [ 3007.804177][ T6796] team0: Port device team_slave_1 added [ 3007.811717][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3007.820677][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3007.829160][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3007.836226][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3007.844173][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3007.853075][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3007.861416][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 3007.868535][ T9029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3007.876320][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3007.889966][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3007.910372][ T6795] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3007.921069][ T6797] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3007.990017][ T6796] device hsr_slave_0 entered promiscuous mode [ 3008.028445][ T6796] device hsr_slave_1 entered promiscuous mode [ 3008.068003][ T6796] debugfs: Directory 'hsr0' with parent '/' already present! [ 3008.076942][ T6795] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3008.088021][ T6797] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3008.160230][ T6794] device hsr_slave_0 entered promiscuous mode [ 3008.218171][ T6794] device hsr_slave_1 entered promiscuous mode [ 3008.257876][ T6794] debugfs: Directory 'hsr0' with parent '/' already present! [ 3008.286251][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3008.294978][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3008.304228][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3008.314945][ T6795] team0: Port device team_slave_0 added [ 3008.368380][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3008.376974][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3008.386027][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3008.394419][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3008.403520][ T6795] team0: Port device team_slave_1 added [ 3008.411848][ T6788] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3008.423027][ T6788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3008.431729][ T6797] team0: Port device team_slave_0 added [ 3008.601891][ T2236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3008.610217][ T2236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3008.622761][ T6797] team0: Port device team_slave_1 added [ 3008.750783][ T6795] device hsr_slave_0 entered promiscuous mode [ 3008.788311][ T6795] device hsr_slave_1 entered promiscuous mode [ 3008.827899][ T6795] debugfs: Directory 'hsr0' with parent '/' already present! [ 3008.844715][ T6788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3008.910126][ T6797] device hsr_slave_0 entered promiscuous mode [ 3008.951389][ T6797] device hsr_slave_1 entered promiscuous mode [ 3009.010844][ T6797] debugfs: Directory 'hsr0' with parent '/' already present! [ 3009.024249][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3009.034155][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3009.064545][ T6794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3009.085711][ T6796] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3009.105411][ T6794] 8021q: adding VLAN 0 to HW filter on device team0 [ 3009.114013][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3009.122024][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3009.136577][ T6796] 8021q: adding VLAN 0 to HW filter on device team0 [ 3009.147612][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3009.155550][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3009.163453][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3009.172261][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3009.180620][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3009.187643][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3009.195826][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3009.258260][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3009.267349][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3009.276866][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3009.284201][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3009.292392][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3009.301788][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3009.310234][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3009.317275][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3009.325275][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3009.334497][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3009.343460][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3009.352204][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3009.361079][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3009.368237][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3009.376585][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3009.385591][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3009.394997][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3009.408283][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3009.417039][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3009.426382][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3009.436085][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3009.444614][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3009.485666][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3009.502747][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3009.523137][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3009.543232][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3009.559524][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3009.568246][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3009.579749][ T6794] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3009.591464][ T6794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3009.606232][ T6795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3009.629658][ T6797] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3009.638113][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3009.646287][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3009.654997][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3009.664383][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3009.673079][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3009.681478][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3009.690080][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3009.705288][ T6796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3009.725871][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3009.733907][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3009.750926][ T6797] 8021q: adding VLAN 0 to HW filter on device team0 [ 3009.765951][ T6795] 8021q: adding VLAN 0 to HW filter on device team0 [ 3009.773470][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3009.785374][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3009.794000][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3009.805350][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3009.817151][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3009.828781][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3009.842189][ T6794] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3009.852702][ T6796] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3009.872709][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3009.882643][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3009.902300][ T3803] bridge0: port 1(bridge_slave_0) entered blocking state [ 3009.909385][ T3803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3009.918168][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3009.931604][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3009.943320][ T3803] bridge0: port 2(bridge_slave_1) entered blocking state [ 3009.950412][ T3803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3009.963026][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3009.972072][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3009.983865][ T3803] bridge0: port 1(bridge_slave_0) entered blocking state [ 3009.990940][ T3803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3010.003151][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3010.012693][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3010.024773][ T3803] bridge0: port 2(bridge_slave_1) entered blocking state [ 3010.031923][ T3803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3010.061979][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3010.077151][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3010.085781][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3010.095996][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3010.105348][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3010.114720][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3010.123806][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3010.132430][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3010.141004][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3010.149994][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3010.158474][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3010.166913][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3010.176400][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3010.207117][ T6797] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3010.227880][ T6797] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3010.240829][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3010.261586][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3010.270644][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3010.283028][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3010.291819][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3010.300645][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3010.309662][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3010.318412][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3010.327051][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3010.335627][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3010.344532][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3010.353387][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3010.466191][ T6795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3010.498204][ T6797] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3010.506315][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3010.514293][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3010.538783][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3010.546652][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3010.565028][ T6795] 8021q: adding VLAN 0 to HW filter on device batadv0 07:58:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:02 executing program 2: 07:58:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:02 executing program 0: 07:58:03 executing program 2: 07:58:03 executing program 0: 07:58:03 executing program 2: 07:58:03 executing program 0: 07:58:03 executing program 2: 07:58:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f0966ba21000f30ee66d44100edb9800000c0670ffc645e66ba400066ed0f300fc75d0066b808008ed0660f38806f000f011c2666b8bf00630ee0", 0x48}], 0xaaaaaaaaaaaac37, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 3013.218600][ T5180] device bridge_slave_1 left promiscuous mode [ 3013.224860][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3013.298378][ T5180] device bridge_slave_0 left promiscuous mode [ 3013.308101][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3013.359274][ T5180] device bridge_slave_1 left promiscuous mode [ 3013.365578][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3013.418336][ T5180] device bridge_slave_0 left promiscuous mode [ 3013.428478][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3014.788019][ T5180] device hsr_slave_0 left promiscuous mode [ 3014.847997][ T5180] device hsr_slave_1 left promiscuous mode [ 3014.914175][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3014.924481][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3014.934697][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3015.001881][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3015.080248][ T5180] bond0 (unregistering): Released all slaves [ 3015.228403][ T5180] device hsr_slave_0 left promiscuous mode [ 3015.268003][ T5180] device hsr_slave_1 left promiscuous mode [ 3015.324522][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3015.335710][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3015.346171][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3015.411706][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3015.479011][ T5180] bond0 (unregistering): Released all slaves [ 3015.576657][ T6887] IPVS: ftp: loaded support on port[0] = 21 [ 3015.576739][ T6884] IPVS: ftp: loaded support on port[0] = 21 [ 3015.608224][ T6888] IPVS: ftp: loaded support on port[0] = 21 [ 3015.689145][ T6887] chnl_net:caif_netlink_parms(): no params data found [ 3015.754538][ T6884] chnl_net:caif_netlink_parms(): no params data found [ 3015.763400][ T6888] chnl_net:caif_netlink_parms(): no params data found [ 3015.833811][ T6887] bridge0: port 1(bridge_slave_0) entered blocking state [ 3015.841021][ T6887] bridge0: port 1(bridge_slave_0) entered disabled state [ 3015.848901][ T6887] device bridge_slave_0 entered promiscuous mode [ 3015.899409][ T6887] bridge0: port 2(bridge_slave_1) entered blocking state [ 3015.906555][ T6887] bridge0: port 2(bridge_slave_1) entered disabled state [ 3015.919702][ T6887] device bridge_slave_1 entered promiscuous mode [ 3015.958705][ T6884] bridge0: port 1(bridge_slave_0) entered blocking state [ 3015.965802][ T6884] bridge0: port 1(bridge_slave_0) entered disabled state [ 3015.973702][ T6884] device bridge_slave_0 entered promiscuous mode [ 3015.982762][ T6887] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3015.996072][ T6888] bridge0: port 1(bridge_slave_0) entered blocking state [ 3016.003629][ T6888] bridge0: port 1(bridge_slave_0) entered disabled state [ 3016.015961][ T6888] device bridge_slave_0 entered promiscuous mode [ 3016.023663][ T6884] bridge0: port 2(bridge_slave_1) entered blocking state [ 3016.031116][ T6884] bridge0: port 2(bridge_slave_1) entered disabled state [ 3016.039243][ T6884] device bridge_slave_1 entered promiscuous mode [ 3016.047373][ T6887] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3016.056538][ T6888] bridge0: port 2(bridge_slave_1) entered blocking state [ 3016.067457][ T6888] bridge0: port 2(bridge_slave_1) entered disabled state [ 3016.075456][ T6888] device bridge_slave_1 entered promiscuous mode [ 3016.102657][ T6884] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3016.133155][ T6884] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3016.148813][ T6888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3016.159111][ T6887] team0: Port device team_slave_0 added [ 3016.165989][ T6888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3016.193332][ T6887] team0: Port device team_slave_1 added [ 3016.208888][ T6888] team0: Port device team_slave_0 added [ 3016.215584][ T6884] team0: Port device team_slave_0 added [ 3016.226116][ T6884] team0: Port device team_slave_1 added [ 3016.233712][ T6888] team0: Port device team_slave_1 added [ 3016.324116][ T6888] device hsr_slave_0 entered promiscuous mode [ 3016.378263][ T6888] device hsr_slave_1 entered promiscuous mode [ 3016.489618][ T6884] device hsr_slave_0 entered promiscuous mode [ 3016.528250][ T6884] device hsr_slave_1 entered promiscuous mode [ 3016.588145][ T6884] debugfs: Directory 'hsr0' with parent '/' already present! [ 3016.670429][ T6887] device hsr_slave_0 entered promiscuous mode [ 3016.738182][ T6887] device hsr_slave_1 entered promiscuous mode [ 3016.777843][ T6887] debugfs: Directory 'hsr0' with parent '/' already present! [ 3016.872608][ T6888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3016.883357][ T6884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3016.900522][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3016.912704][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3016.923350][ T6884] 8021q: adding VLAN 0 to HW filter on device team0 [ 3016.938208][ T6888] 8021q: adding VLAN 0 to HW filter on device team0 [ 3016.945380][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3016.956847][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3016.977069][ T6887] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3016.999817][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3017.013073][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3017.022140][ T7916] bridge0: port 1(bridge_slave_0) entered blocking state [ 3017.029213][ T7916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3017.041902][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3017.050639][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3017.059081][ T7916] bridge0: port 1(bridge_slave_0) entered blocking state [ 3017.066101][ T7916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3017.074118][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3017.083165][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3017.091576][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 3017.098605][ T7916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3017.106379][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3017.115637][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3017.124446][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3017.132987][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 3017.140055][ T7916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3017.161148][ T6887] 8021q: adding VLAN 0 to HW filter on device team0 [ 3017.168271][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3017.176345][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3017.184736][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3017.195034][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3017.204419][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3017.212485][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3017.220665][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3017.243499][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3017.252512][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3017.261268][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3017.270241][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3017.282638][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3017.291015][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3017.303375][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3017.311906][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3017.320333][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3017.328952][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3017.338262][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3017.346187][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3017.354901][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3017.368829][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3017.381042][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3017.392251][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3017.399357][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3017.407633][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3017.416460][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3017.425073][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3017.432100][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3017.447847][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3017.455905][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3017.464880][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3017.473761][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3017.482975][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3017.491696][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3017.499948][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3017.508854][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3017.517186][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3017.534867][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3017.543102][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3017.551861][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3017.564213][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3017.580954][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3017.589880][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3017.599063][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3017.607567][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3017.616154][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3017.623882][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3017.635017][ T6887] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3017.646260][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3017.656214][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3017.664704][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3017.675035][ T6888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3017.696052][ T6884] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3017.703508][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3017.711780][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3017.724664][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3017.741293][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3017.898011][ T6887] 8021q: adding VLAN 0 to HW filter on device batadv0 07:58:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:10 executing program 0: ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100002000633277fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 07:58:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) fstat(0xffffffffffffffff, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {0xffffffffffffffff, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3019.643672][ T6711] device bridge_slave_1 left promiscuous mode [ 3019.671739][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state 07:58:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:10 executing program 0: ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f086dd1fffffe100002000633277fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) [ 3019.739939][ T6711] device bridge_slave_0 left promiscuous mode [ 3019.758133][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state 07:58:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) fstat(0xffffffffffffffff, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {0xffffffffffffffff, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3019.789471][ T6711] device bridge_slave_1 left promiscuous mode [ 3019.795649][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3019.892292][ T6711] device bridge_slave_0 left promiscuous mode [ 3019.899735][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3019.959239][ T6711] device bridge_slave_1 left promiscuous mode [ 3019.968199][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state 07:58:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) [ 3020.039264][ T6711] device bridge_slave_0 left promiscuous mode [ 3020.045555][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3022.568083][ T6711] device hsr_slave_0 left promiscuous mode [ 3022.617981][ T6711] device hsr_slave_1 left promiscuous mode [ 3022.684763][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3022.695032][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3022.704937][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3022.791574][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3022.858007][ T6711] bond0 (unregistering): Released all slaves [ 3022.978142][ T6711] device hsr_slave_0 left promiscuous mode [ 3023.018036][ T6711] device hsr_slave_1 left promiscuous mode [ 3023.064825][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3023.075168][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3023.085313][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3023.122079][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3023.189577][ T6711] bond0 (unregistering): Released all slaves [ 3023.338100][ T6711] device hsr_slave_0 left promiscuous mode [ 3023.388368][ T6711] device hsr_slave_1 left promiscuous mode [ 3023.444944][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3023.455324][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3023.466030][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3023.501928][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3023.578664][ T6711] bond0 (unregistering): Released all slaves 07:58:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x2, 0x1000000000000002, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) write$P9_RSTATu(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESOCT], 0x2b) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r2, 0x0, 0xffff, 0x9) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x10001) writev(r0, &(0x7f00000013c0)=[{&(0x7f0000000040)="ca", 0x1}], 0x1) [ 3023.753007][ T6946] IPVS: ftp: loaded support on port[0] = 21 [ 3023.764361][ T6948] IPVS: ftp: loaded support on port[0] = 21 [ 3023.906136][ T6946] chnl_net:caif_netlink_parms(): no params data found [ 3023.954812][ T6948] chnl_net:caif_netlink_parms(): no params data found [ 3023.969364][ T6946] bridge0: port 1(bridge_slave_0) entered blocking state [ 3023.976491][ T6946] bridge0: port 1(bridge_slave_0) entered disabled state [ 3023.984552][ T6946] device bridge_slave_0 entered promiscuous mode [ 3024.003787][ T6946] bridge0: port 2(bridge_slave_1) entered blocking state [ 3024.010912][ T6946] bridge0: port 2(bridge_slave_1) entered disabled state [ 3024.018797][ T6946] device bridge_slave_1 entered promiscuous mode [ 3024.045131][ T6946] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3024.097988][ T6948] bridge0: port 1(bridge_slave_0) entered blocking state [ 3024.105137][ T6948] bridge0: port 1(bridge_slave_0) entered disabled state [ 3024.114050][ T6948] device bridge_slave_0 entered promiscuous mode [ 3024.122704][ T6946] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3024.131794][ T6948] bridge0: port 2(bridge_slave_1) entered blocking state [ 3024.139313][ T6948] bridge0: port 2(bridge_slave_1) entered disabled state [ 3024.147023][ T6948] device bridge_slave_1 entered promiscuous mode [ 3024.263968][ T6946] team0: Port device team_slave_0 added [ 3024.278985][ T6946] team0: Port device team_slave_1 added [ 3024.291397][ T6948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3024.305418][ T6948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3024.342171][ T6948] team0: Port device team_slave_0 added [ 3024.390056][ T6946] device hsr_slave_0 entered promiscuous mode [ 3024.461636][ T6946] device hsr_slave_1 entered promiscuous mode [ 3024.547818][ T6946] debugfs: Directory 'hsr0' with parent '/' already present! [ 3024.556359][ T6948] team0: Port device team_slave_1 added [ 3024.629711][ T6948] device hsr_slave_0 entered promiscuous mode [ 3024.688218][ T6948] device hsr_slave_1 entered promiscuous mode [ 3024.737891][ T6948] debugfs: Directory 'hsr0' with parent '/' already present! [ 3024.748836][ T6946] bridge0: port 2(bridge_slave_1) entered blocking state [ 3024.755917][ T6946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3024.763243][ T6946] bridge0: port 1(bridge_slave_0) entered blocking state [ 3024.770351][ T6946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3024.783283][T26317] bridge0: port 1(bridge_slave_0) entered disabled state [ 3024.792562][T26317] bridge0: port 2(bridge_slave_1) entered disabled state [ 3024.844440][ T6946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3024.859998][ T6946] 8021q: adding VLAN 0 to HW filter on device team0 [ 3024.867324][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3024.875745][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3024.892785][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3024.901510][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3024.909912][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3024.916971][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3024.925011][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3024.934139][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3024.942466][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3024.949585][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3024.957546][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3024.976925][ T6946] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3024.987567][ T6946] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3025.000357][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3025.009918][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3025.018989][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3025.027668][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3025.036943][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3025.046045][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3025.054749][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3025.063385][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3025.071942][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3025.080792][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3025.089185][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3025.101883][ T6948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3025.118618][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3025.126069][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3025.133686][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3025.148553][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3025.159349][ T6948] 8021q: adding VLAN 0 to HW filter on device team0 [ 3025.174562][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3025.183185][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3025.191473][ T5269] bridge0: port 1(bridge_slave_0) entered blocking state [ 3025.198561][ T5269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3025.206379][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3025.215218][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3025.223674][ T5269] bridge0: port 2(bridge_slave_1) entered blocking state [ 3025.230761][ T5269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3025.238720][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3025.252799][ T2236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3025.262027][ T2236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3025.277965][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3025.287046][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3025.296242][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3025.305138][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3025.314147][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3025.323164][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3025.333563][ T6946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3025.344750][ T6948] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3025.356678][ T6948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3025.365233][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3025.374350][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3025.383298][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3025.402236][ T6948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3025.411831][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3025.420762][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:58:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:17 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) fstat(0xffffffffffffffff, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {0xffffffffffffffff, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:17 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = gettid() r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) tkill(r1, 0x9) 07:58:17 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:17 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:17 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:17 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:18 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) [ 3028.937491][ T7006] IPVS: ftp: loaded support on port[0] = 21 [ 3028.987647][ T6711] device bridge_slave_1 left promiscuous mode [ 3028.994073][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3029.038452][ T6711] device bridge_slave_0 left promiscuous mode [ 3029.044620][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3029.079291][ T6711] device bridge_slave_1 left promiscuous mode [ 3029.085476][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3029.118467][ T6711] device bridge_slave_0 left promiscuous mode [ 3029.124676][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3029.179387][ T6711] device bridge_slave_1 left promiscuous mode [ 3029.185630][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3029.228799][ T6711] device bridge_slave_0 left promiscuous mode [ 3029.235162][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3031.148891][ T6711] device hsr_slave_0 left promiscuous mode [ 3031.197873][ T6711] device hsr_slave_1 left promiscuous mode [ 3031.264436][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3031.274994][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3031.285257][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3031.331212][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3031.410009][ T6711] bond0 (unregistering): Released all slaves [ 3031.578081][ T6711] device hsr_slave_0 left promiscuous mode [ 3031.628011][ T6711] device hsr_slave_1 left promiscuous mode [ 3031.694083][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3031.704577][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3031.715039][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3031.771468][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3031.848785][ T6711] bond0 (unregistering): Released all slaves [ 3031.998167][ T6711] device hsr_slave_0 left promiscuous mode [ 3032.037922][ T6711] device hsr_slave_1 left promiscuous mode [ 3032.093874][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3032.104171][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3032.114616][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3032.171215][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3032.239292][ T6711] bond0 (unregistering): Released all slaves [ 3032.364699][ T7006] chnl_net:caif_netlink_parms(): no params data found [ 3032.392907][ T7006] bridge0: port 1(bridge_slave_0) entered blocking state [ 3032.397051][ T7009] IPVS: ftp: loaded support on port[0] = 21 [ 3032.400093][ T7006] bridge0: port 1(bridge_slave_0) entered disabled state [ 3032.400913][ T7006] device bridge_slave_0 entered promiscuous mode [ 3032.421433][ T7006] bridge0: port 2(bridge_slave_1) entered blocking state [ 3032.429111][ T7006] bridge0: port 2(bridge_slave_1) entered disabled state [ 3032.436844][ T7006] device bridge_slave_1 entered promiscuous mode [ 3032.457509][ T7006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3032.468682][ T7006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3032.499429][ T7006] team0: Port device team_slave_0 added [ 3032.508850][ T7006] team0: Port device team_slave_1 added [ 3032.570366][ T7006] device hsr_slave_0 entered promiscuous mode [ 3032.618130][ T7006] device hsr_slave_1 entered promiscuous mode [ 3032.671214][ T7006] bridge0: port 2(bridge_slave_1) entered blocking state [ 3032.678320][ T7006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3032.685602][ T7006] bridge0: port 1(bridge_slave_0) entered blocking state [ 3032.692677][ T7006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3032.730806][ T7009] chnl_net:caif_netlink_parms(): no params data found [ 3032.761698][ T7009] bridge0: port 1(bridge_slave_0) entered blocking state [ 3032.768911][ T7009] bridge0: port 1(bridge_slave_0) entered disabled state [ 3032.776610][ T7009] device bridge_slave_0 entered promiscuous mode [ 3032.784195][ T7009] bridge0: port 2(bridge_slave_1) entered blocking state [ 3032.791372][ T7009] bridge0: port 2(bridge_slave_1) entered disabled state [ 3032.799074][ T7009] device bridge_slave_1 entered promiscuous mode [ 3032.817962][ T7009] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3032.830982][ T7009] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3032.853231][ T7009] team0: Port device team_slave_0 added [ 3032.859889][ T7009] team0: Port device team_slave_1 added [ 3032.909867][ T7009] device hsr_slave_0 entered promiscuous mode [ 3032.978215][ T7009] device hsr_slave_1 entered promiscuous mode [ 3033.030385][ T7009] debugfs: Directory 'hsr0' with parent '/' already present! [ 3033.103169][ T7006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3033.234399][ T7006] 8021q: adding VLAN 0 to HW filter on device team0 [ 3033.242360][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3033.251138][ T5608] bridge0: port 1(bridge_slave_0) entered disabled state [ 3033.259688][ T5608] bridge0: port 2(bridge_slave_1) entered disabled state [ 3033.268978][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3033.310348][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3033.321802][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 3033.328852][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3033.337592][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3033.349782][ T5608] bridge0: port 2(bridge_slave_1) entered blocking state [ 3033.356835][ T5608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3033.399648][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3033.409344][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3033.418673][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3033.426911][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3033.439600][ T7006] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3033.453430][ T7006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3033.462462][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3033.474194][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3033.499247][ T7009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3033.511263][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3033.518931][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3033.526371][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3033.538093][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3033.548943][ T7006] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3033.558197][ T7009] 8021q: adding VLAN 0 to HW filter on device team0 [ 3033.575386][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3033.590403][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3033.600811][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3033.607935][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3033.617673][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3033.639757][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3033.648782][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3033.657119][T26317] bridge0: port 2(bridge_slave_1) entered blocking state [ 3033.664275][T26317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3033.679702][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3033.689339][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3033.698885][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3033.708451][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3033.717157][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3033.725890][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3033.734676][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3033.742983][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3033.751800][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3033.764180][ T7009] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3033.775580][ T7009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3033.784988][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3033.794436][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3033.811477][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3033.819065][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3033.833872][ T7009] 8021q: adding VLAN 0 to HW filter on device batadv0 07:58:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:25 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:25 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:26 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:26 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) [ 3036.910858][ T7044] IPVS: ftp: loaded support on port[0] = 21 [ 3037.020400][ T7044] chnl_net:caif_netlink_parms(): no params data found [ 3037.032212][ T6711] device bridge_slave_1 left promiscuous mode [ 3037.038504][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3037.078479][ T6711] device bridge_slave_0 left promiscuous mode [ 3037.084746][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3037.148990][ T6711] device bridge_slave_1 left promiscuous mode [ 3037.155412][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3037.208648][ T6711] device bridge_slave_0 left promiscuous mode [ 3037.214996][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3037.259010][ T6711] device bridge_slave_1 left promiscuous mode [ 3037.265227][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3037.318377][ T6711] device bridge_slave_0 left promiscuous mode [ 3037.325085][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3039.318428][ T6711] device hsr_slave_0 left promiscuous mode [ 3039.357898][ T6711] device hsr_slave_1 left promiscuous mode [ 3039.413897][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3039.424130][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3039.434173][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3039.501968][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3039.580762][ T6711] bond0 (unregistering): Released all slaves [ 3039.718126][ T6711] device hsr_slave_0 left promiscuous mode [ 3039.778177][ T6711] device hsr_slave_1 left promiscuous mode [ 3039.865056][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3039.875217][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3039.885284][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3039.931254][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3039.989068][ T6711] bond0 (unregistering): Released all slaves [ 3040.148123][ T6711] device hsr_slave_0 left promiscuous mode [ 3040.187895][ T6711] device hsr_slave_1 left promiscuous mode [ 3040.244368][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3040.254246][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3040.265023][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3040.344396][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3040.398531][ T6711] bond0 (unregistering): Released all slaves [ 3040.534343][ T7051] IPVS: ftp: loaded support on port[0] = 21 [ 3040.534619][ T7053] IPVS: ftp: loaded support on port[0] = 21 [ 3040.546289][ T7052] IPVS: ftp: loaded support on port[0] = 21 [ 3040.566211][ T7044] bridge0: port 1(bridge_slave_0) entered blocking state [ 3040.575546][ T7044] bridge0: port 1(bridge_slave_0) entered disabled state [ 3040.584204][ T7044] device bridge_slave_0 entered promiscuous mode [ 3040.600129][ T7044] bridge0: port 2(bridge_slave_1) entered blocking state [ 3040.607235][ T7044] bridge0: port 2(bridge_slave_1) entered disabled state [ 3040.615107][ T7044] device bridge_slave_1 entered promiscuous mode [ 3040.653013][ T7050] IPVS: ftp: loaded support on port[0] = 21 [ 3040.665126][ T7044] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3040.677585][ T7044] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3040.710088][ T7044] team0: Port device team_slave_0 added [ 3040.747543][ T7044] team0: Port device team_slave_1 added [ 3040.779253][ T7052] chnl_net:caif_netlink_parms(): no params data found [ 3040.840472][ T7044] device hsr_slave_0 entered promiscuous mode [ 3040.908178][ T7044] device hsr_slave_1 entered promiscuous mode [ 3040.947849][ T7044] debugfs: Directory 'hsr0' with parent '/' already present! [ 3040.993156][ T7052] bridge0: port 1(bridge_slave_0) entered blocking state [ 3041.000461][ T7052] bridge0: port 1(bridge_slave_0) entered disabled state [ 3041.011052][ T7052] device bridge_slave_0 entered promiscuous mode [ 3041.051558][ T7052] bridge0: port 2(bridge_slave_1) entered blocking state [ 3041.058723][ T7052] bridge0: port 2(bridge_slave_1) entered disabled state [ 3041.066511][ T7052] device bridge_slave_1 entered promiscuous mode [ 3041.080069][ T7053] chnl_net:caif_netlink_parms(): no params data found [ 3041.090038][ T7051] chnl_net:caif_netlink_parms(): no params data found [ 3041.103899][ T7044] bridge0: port 2(bridge_slave_1) entered blocking state [ 3041.110977][ T7044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3041.141404][ T7052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3041.153009][ T7052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3041.263042][ T7053] bridge0: port 1(bridge_slave_0) entered blocking state [ 3041.270326][ T7053] bridge0: port 1(bridge_slave_0) entered disabled state [ 3041.278419][ T7053] device bridge_slave_0 entered promiscuous mode [ 3041.286565][ T7053] bridge0: port 2(bridge_slave_1) entered blocking state [ 3041.293810][ T7053] bridge0: port 2(bridge_slave_1) entered disabled state [ 3041.301605][ T7053] device bridge_slave_1 entered promiscuous mode [ 3041.411355][ T7051] bridge0: port 1(bridge_slave_0) entered blocking state [ 3041.418551][ T7051] bridge0: port 1(bridge_slave_0) entered disabled state [ 3041.426510][ T7051] device bridge_slave_0 entered promiscuous mode [ 3041.434830][ T7051] bridge0: port 2(bridge_slave_1) entered blocking state [ 3041.442170][ T7051] bridge0: port 2(bridge_slave_1) entered disabled state [ 3041.450331][ T7051] device bridge_slave_1 entered promiscuous mode [ 3041.457005][ T7050] chnl_net:caif_netlink_parms(): no params data found [ 3041.483218][ T7052] team0: Port device team_slave_0 added [ 3041.513360][ T7052] team0: Port device team_slave_1 added [ 3041.526413][ T7053] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3041.538032][ T7051] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3041.551812][ T7044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3041.577109][ T7053] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3041.588309][ T7051] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3041.603609][ T7044] 8021q: adding VLAN 0 to HW filter on device team0 [ 3041.650202][ T7052] device hsr_slave_0 entered promiscuous mode [ 3041.701601][ T7052] device hsr_slave_1 entered promiscuous mode [ 3041.761281][ T7052] debugfs: Directory 'hsr0' with parent '/' already present! [ 3041.774102][T30483] bridge0: port 2(bridge_slave_1) entered disabled state [ 3041.788431][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3041.809090][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3041.816858][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3041.832574][ T7050] bridge0: port 1(bridge_slave_0) entered blocking state [ 3041.842848][ T7050] bridge0: port 1(bridge_slave_0) entered disabled state [ 3041.850961][ T7050] device bridge_slave_0 entered promiscuous mode [ 3041.863384][ T7050] bridge0: port 2(bridge_slave_1) entered blocking state [ 3041.870855][ T7050] bridge0: port 2(bridge_slave_1) entered disabled state [ 3041.881672][ T7050] device bridge_slave_1 entered promiscuous mode [ 3041.906544][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3041.915641][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3041.927400][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3041.934508][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3041.942798][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3041.952242][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3041.960669][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3041.967677][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3041.981921][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3041.991511][ T7053] team0: Port device team_slave_0 added [ 3042.003371][ T7053] team0: Port device team_slave_1 added [ 3042.013142][ T7051] team0: Port device team_slave_0 added [ 3042.019918][ T7051] team0: Port device team_slave_1 added [ 3042.043474][ T7050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3042.054449][ T7050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3042.103281][ T7053] device hsr_slave_0 entered promiscuous mode [ 3042.168218][ T7053] device hsr_slave_1 entered promiscuous mode [ 3042.207882][ T7053] debugfs: Directory 'hsr0' with parent '/' already present! [ 3042.217946][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3042.270044][ T7051] device hsr_slave_0 entered promiscuous mode [ 3042.308376][ T7051] device hsr_slave_1 entered promiscuous mode [ 3042.358110][ T7051] debugfs: Directory 'hsr0' with parent '/' already present! [ 3042.377017][ T7050] team0: Port device team_slave_0 added [ 3042.384136][ T7050] team0: Port device team_slave_1 added [ 3042.409426][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3042.418553][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3042.427022][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3042.441810][ T7044] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3042.452346][ T7044] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3042.504226][ T7050] device hsr_slave_0 entered promiscuous mode [ 3042.568300][ T7050] device hsr_slave_1 entered promiscuous mode [ 3042.617961][ T7050] debugfs: Directory 'hsr0' with parent '/' already present! [ 3042.628797][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3042.637358][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3042.646114][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3042.654500][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3042.663243][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3042.671731][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3042.681595][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3042.730348][ T7052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3042.744191][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3042.751892][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3042.768851][ T7044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3042.813068][ T7052] 8021q: adding VLAN 0 to HW filter on device team0 [ 3042.832020][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3042.840186][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3042.850885][ T7051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3042.872453][ T7051] 8021q: adding VLAN 0 to HW filter on device team0 [ 3042.899122][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3042.907163][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3042.915320][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3042.923944][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3042.932440][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3042.939493][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3042.947559][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3042.956496][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3042.965223][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 3042.972328][ T9029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3042.980208][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3042.989167][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3042.998200][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3043.006721][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3043.015394][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3043.023985][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3043.033135][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3043.041188][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3043.052082][ T7050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3043.064051][ T7052] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3043.075142][ T7052] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3043.089082][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3043.097567][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3043.106185][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3043.114650][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3043.147131][ T7053] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3043.183639][ T7050] 8021q: adding VLAN 0 to HW filter on device team0 [ 3043.192243][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3043.200388][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3043.208716][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3043.217064][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3043.226721][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3043.235411][ T7916] bridge0: port 1(bridge_slave_0) entered blocking state [ 3043.242526][ T7916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3043.250734][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3043.259498][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3043.268932][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 3043.275963][ T7916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3043.284861][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3043.295546][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3043.306910][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3043.319449][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3043.331581][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3043.342114][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3043.655023][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3043.663232][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3043.671273][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3043.678829][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3043.686221][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3043.694447][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3043.707234][ T7052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3043.775784][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3043.787908][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3043.796228][ T5269] bridge0: port 1(bridge_slave_0) entered blocking state [ 3043.803561][ T5269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3043.811607][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3043.819978][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3043.829535][ T7053] 8021q: adding VLAN 0 to HW filter on device team0 [ 3043.895526][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3043.903526][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3043.912597][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3043.921079][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3043.930019][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3043.938548][ T5269] bridge0: port 2(bridge_slave_1) entered blocking state [ 3043.945589][ T5269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3043.956362][ T7051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3044.041187][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3044.050009][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3044.076343][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 3044.083559][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3044.109386][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3044.118869][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3044.138248][ T5608] bridge0: port 2(bridge_slave_1) entered blocking state [ 3044.145399][ T5608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3044.153804][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3044.162911][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3044.171781][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3044.180869][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3044.189490][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3044.198147][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3044.205522][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3044.227633][ T7050] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3044.239462][ T7050] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3044.385883][ T7051] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3044.393739][ T7053] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3044.418040][ T7053] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3044.430397][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3044.438708][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3044.446845][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3044.456028][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3044.464653][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3044.473657][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3044.482388][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3044.491360][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3044.500012][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3044.508564][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3044.516791][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3044.525203][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3044.533811][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3044.542291][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3044.550701][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3044.559083][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3044.567523][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3044.576129][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3044.584340][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3044.592422][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3044.667562][ T7050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3044.735330][ T7053] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3044.745900][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3044.753655][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3044.765801][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3044.773448][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3045.172536][ T6711] device bridge_slave_1 left promiscuous mode [ 3045.198117][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3045.242533][ T6711] device bridge_slave_0 left promiscuous mode [ 3045.249652][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3045.309321][ T6711] device bridge_slave_1 left promiscuous mode [ 3045.315593][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3045.402075][ T6711] device bridge_slave_0 left promiscuous mode [ 3045.429098][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state 07:58:36 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:37 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {}, [{}, {}, {}, {}, {}, {}, {}]}, 0x5c, 0x0) 07:58:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:37 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000240)) r0 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000380), 0x313) 07:58:37 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000240)) r0 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000380), 0x313) 07:58:37 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000240)) r0 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000380), 0x313) 07:58:37 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:37 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:38 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:38 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) [ 3047.648178][ T6711] device hsr_slave_0 left promiscuous mode [ 3047.708030][ T6711] device hsr_slave_1 left promiscuous mode [ 3047.764967][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3047.775584][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3047.786454][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3047.861666][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3047.938138][ T6711] bond0 (unregistering): Released all slaves [ 3048.078193][ T6711] device hsr_slave_0 left promiscuous mode [ 3048.117943][ T6711] device hsr_slave_1 left promiscuous mode [ 3048.164816][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3048.174994][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3048.184951][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3048.221678][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3048.300256][ T6711] bond0 (unregistering): Released all slaves [ 3048.661402][ T7135] IPVS: ftp: loaded support on port[0] = 21 [ 3048.925484][ T7135] chnl_net:caif_netlink_parms(): no params data found [ 3048.954389][ T7135] bridge0: port 1(bridge_slave_0) entered blocking state [ 3048.961640][ T7135] bridge0: port 1(bridge_slave_0) entered disabled state [ 3048.970052][ T7135] device bridge_slave_0 entered promiscuous mode [ 3048.977737][ T7135] bridge0: port 2(bridge_slave_1) entered blocking state [ 3048.985330][ T7135] bridge0: port 2(bridge_slave_1) entered disabled state [ 3048.993828][ T7135] device bridge_slave_1 entered promiscuous mode [ 3049.011789][ T7135] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3049.022685][ T7135] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3049.042457][ T7135] team0: Port device team_slave_0 added [ 3049.049046][ T7135] team0: Port device team_slave_1 added [ 3049.103739][ T7135] device hsr_slave_0 entered promiscuous mode [ 3049.158159][ T7135] device hsr_slave_1 entered promiscuous mode [ 3049.244731][ T7135] bridge0: port 2(bridge_slave_1) entered blocking state [ 3049.251830][ T7135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3049.259196][ T7135] bridge0: port 1(bridge_slave_0) entered blocking state [ 3049.266232][ T7135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3049.300258][ T7135] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3049.314145][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3049.322528][ T9029] bridge0: port 1(bridge_slave_0) entered disabled state [ 3049.331179][ T9029] bridge0: port 2(bridge_slave_1) entered disabled state [ 3049.343676][ T7135] 8021q: adding VLAN 0 to HW filter on device team0 [ 3049.355257][ T2236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3049.363706][ T2236] bridge0: port 1(bridge_slave_0) entered blocking state [ 3049.370851][ T2236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3049.383033][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3049.391819][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3049.398882][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3049.420205][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3049.429079][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3049.437709][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3049.447516][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3049.455894][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3049.464390][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3049.486365][ T7135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3049.501785][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3049.509716][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3049.521670][ T7135] 8021q: adding VLAN 0 to HW filter on device batadv0 07:58:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:41 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:41 executing program 0: 07:58:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:42 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {0xffffffffffffffff, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {0xffffffffffffffff, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:42 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:43 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) [ 3052.772758][ T7158] IPVS: ftp: loaded support on port[0] = 21 07:58:44 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) [ 3053.236503][ T7158] chnl_net:caif_netlink_parms(): no params data found [ 3053.513340][ T7165] IPVS: ftp: loaded support on port[0] = 21 [ 3053.668261][ T7158] bridge0: port 1(bridge_slave_0) entered blocking state [ 3053.675399][ T7158] bridge0: port 1(bridge_slave_0) entered disabled state [ 3053.678335][ T7166] IPVS: ftp: loaded support on port[0] = 21 [ 3053.683519][ T7158] device bridge_slave_0 entered promiscuous mode [ 3053.696290][ T7158] bridge0: port 2(bridge_slave_1) entered blocking state [ 3053.703447][ T7158] bridge0: port 2(bridge_slave_1) entered disabled state [ 3053.711543][ T7158] device bridge_slave_1 entered promiscuous mode [ 3053.726543][ T6711] device bridge_slave_1 left promiscuous mode [ 3053.729298][ T7167] IPVS: ftp: loaded support on port[0] = 21 [ 3053.733424][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state 07:58:44 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, 0x0) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) [ 3053.818692][ T6711] device bridge_slave_0 left promiscuous mode [ 3053.825117][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3053.889160][ T6711] device bridge_slave_1 left promiscuous mode [ 3053.895376][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3053.958425][ T6711] device bridge_slave_0 left promiscuous mode [ 3053.964824][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3054.018871][ T6711] device bridge_slave_1 left promiscuous mode [ 3054.025092][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3054.088591][ T6711] device bridge_slave_0 left promiscuous mode [ 3054.094868][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3054.149042][ T6711] device bridge_slave_1 left promiscuous mode [ 3054.155342][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3054.189088][ T6711] device bridge_slave_0 left promiscuous mode [ 3054.195308][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3054.259078][ T6711] device bridge_slave_1 left promiscuous mode [ 3054.265246][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3054.311819][ T6711] device bridge_slave_0 left promiscuous mode [ 3054.318843][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state 07:58:45 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, 0x0) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) [ 3057.428099][ T6711] device hsr_slave_0 left promiscuous mode [ 3057.457852][ T6711] device hsr_slave_1 left promiscuous mode [ 3057.514255][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3057.524505][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3057.534384][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3057.591670][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3057.647329][ T6711] bond0 (unregistering): Released all slaves [ 3057.778160][ T6711] device hsr_slave_0 left promiscuous mode [ 3057.817978][ T6711] device hsr_slave_1 left promiscuous mode [ 3057.864216][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3057.874596][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3057.884407][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3057.921719][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3057.999533][ T6711] bond0 (unregistering): Released all slaves [ 3058.138091][ T6711] device hsr_slave_0 left promiscuous mode [ 3058.187960][ T6711] device hsr_slave_1 left promiscuous mode [ 3058.253488][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3058.264234][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3058.274448][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3058.331667][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3058.408018][ T6711] bond0 (unregistering): Released all slaves [ 3058.528130][ T6711] device hsr_slave_0 left promiscuous mode [ 3058.587911][ T6711] device hsr_slave_1 left promiscuous mode [ 3058.634776][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3058.644979][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3058.654973][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3058.711532][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3058.768025][ T6711] bond0 (unregistering): Released all slaves [ 3058.888217][ T6711] device hsr_slave_0 left promiscuous mode [ 3058.947868][ T6711] device hsr_slave_1 left promiscuous mode [ 3059.003630][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3059.014237][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3059.024190][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3059.071242][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3059.137010][ T6711] bond0 (unregistering): Released all slaves [ 3059.242803][ T7158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3059.254214][ T7158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3059.271286][ T7171] IPVS: ftp: loaded support on port[0] = 21 [ 3059.298099][ T7158] team0: Port device team_slave_0 added [ 3059.305917][ T7158] team0: Port device team_slave_1 added [ 3059.372812][ T7165] chnl_net:caif_netlink_parms(): no params data found [ 3059.449960][ T7158] device hsr_slave_0 entered promiscuous mode [ 3059.488210][ T7158] device hsr_slave_1 entered promiscuous mode [ 3059.548146][ T7158] debugfs: Directory 'hsr0' with parent '/' already present! [ 3059.614443][ T7165] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.621725][ T7165] bridge0: port 1(bridge_slave_0) entered disabled state [ 3059.629526][ T7165] device bridge_slave_0 entered promiscuous mode [ 3059.636962][ T7165] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.644072][ T7165] bridge0: port 2(bridge_slave_1) entered disabled state [ 3059.651761][ T7165] device bridge_slave_1 entered promiscuous mode [ 3059.706802][ T7166] chnl_net:caif_netlink_parms(): no params data found [ 3059.726017][ T7165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3059.761453][ T7165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3059.779149][ T7166] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.786202][ T7166] bridge0: port 1(bridge_slave_0) entered disabled state [ 3059.794000][ T7166] device bridge_slave_0 entered promiscuous mode [ 3059.802208][ T7166] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.809690][ T7166] bridge0: port 2(bridge_slave_1) entered disabled state [ 3059.817371][ T7166] device bridge_slave_1 entered promiscuous mode [ 3059.826663][ T7167] chnl_net:caif_netlink_parms(): no params data found [ 3059.846136][ T7165] team0: Port device team_slave_0 added [ 3059.856542][ T7171] chnl_net:caif_netlink_parms(): no params data found [ 3059.875808][ T7165] team0: Port device team_slave_1 added [ 3059.903926][ T7166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3059.916438][ T7166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3059.930708][ T7167] bridge0: port 1(bridge_slave_0) entered blocking state [ 3059.938498][ T7167] bridge0: port 1(bridge_slave_0) entered disabled state [ 3059.946311][ T7167] device bridge_slave_0 entered promiscuous mode [ 3059.954527][ T7167] bridge0: port 2(bridge_slave_1) entered blocking state [ 3059.961899][ T7167] bridge0: port 2(bridge_slave_1) entered disabled state [ 3059.969757][ T7167] device bridge_slave_1 entered promiscuous mode [ 3060.050197][ T7165] device hsr_slave_0 entered promiscuous mode [ 3060.108224][ T7165] device hsr_slave_1 entered promiscuous mode [ 3060.147895][ T7165] debugfs: Directory 'hsr0' with parent '/' already present! [ 3060.165512][ T7166] team0: Port device team_slave_0 added [ 3060.173029][ T7167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3060.204527][ T7166] team0: Port device team_slave_1 added [ 3060.211392][ T7167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3060.225016][ T7165] bridge0: port 2(bridge_slave_1) entered blocking state [ 3060.232084][ T7165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3060.239418][ T7165] bridge0: port 1(bridge_slave_0) entered blocking state [ 3060.246433][ T7165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3060.258295][ T7171] bridge0: port 1(bridge_slave_0) entered blocking state [ 3060.265336][ T7171] bridge0: port 1(bridge_slave_0) entered disabled state [ 3060.273521][ T7171] device bridge_slave_0 entered promiscuous mode [ 3060.282111][ T7171] bridge0: port 2(bridge_slave_1) entered blocking state [ 3060.289722][ T7171] bridge0: port 2(bridge_slave_1) entered disabled state [ 3060.297630][ T7171] device bridge_slave_1 entered promiscuous mode [ 3060.313257][ T7158] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3060.323258][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3060.333386][ T7916] bridge0: port 1(bridge_slave_0) entered disabled state [ 3060.341224][ T7916] bridge0: port 2(bridge_slave_1) entered disabled state [ 3060.500189][ T7166] device hsr_slave_0 entered promiscuous mode [ 3060.568182][ T7166] device hsr_slave_1 entered promiscuous mode [ 3060.607844][ T7166] debugfs: Directory 'hsr0' with parent '/' already present! [ 3060.617279][ T7167] team0: Port device team_slave_0 added [ 3060.625117][ T7171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3060.635882][ T7171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3060.738779][ T7167] team0: Port device team_slave_1 added [ 3060.780589][ T7171] team0: Port device team_slave_0 added [ 3060.795259][ T7158] 8021q: adding VLAN 0 to HW filter on device team0 [ 3060.805410][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3060.817077][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3060.834020][ T7171] team0: Port device team_slave_1 added [ 3060.852893][ T7165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3060.914003][ T7171] device hsr_slave_0 entered promiscuous mode [ 3060.961257][ T7171] device hsr_slave_1 entered promiscuous mode [ 3061.017821][ T7171] debugfs: Directory 'hsr0' with parent '/' already present! [ 3061.033490][ T7165] 8021q: adding VLAN 0 to HW filter on device team0 [ 3061.073487][ T7167] device hsr_slave_0 entered promiscuous mode [ 3061.128174][ T7167] device hsr_slave_1 entered promiscuous mode [ 3061.157888][ T7167] debugfs: Directory 'hsr0' with parent '/' already present! [ 3061.167920][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3061.176696][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3061.185090][ T5609] bridge0: port 1(bridge_slave_0) entered blocking state [ 3061.192133][ T5609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3061.200765][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3061.209403][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3061.217685][ T5609] bridge0: port 2(bridge_slave_1) entered blocking state [ 3061.224856][ T5609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3061.232970][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3061.241073][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3061.275751][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3061.283823][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3061.292870][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3061.302541][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3061.311161][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3061.320155][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3061.328918][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3061.337293][ T1828] bridge0: port 1(bridge_slave_0) entered blocking state [ 3061.344331][ T1828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3061.352303][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3061.361146][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3061.369563][ T1828] bridge0: port 2(bridge_slave_1) entered blocking state [ 3061.376686][ T1828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3061.384610][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3061.393706][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3061.402661][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3061.411251][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3061.435152][ T7158] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3061.445586][ T7158] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3061.459281][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3061.468230][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3061.476317][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3061.484971][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3061.493863][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3061.502310][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3061.511132][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3061.519365][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3061.527982][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3061.556652][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3061.565804][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3061.579589][ T7165] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3061.593401][ T7165] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3061.618976][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3061.627393][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3061.636325][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3061.644895][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3061.653520][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3061.660927][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3061.668449][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3061.688349][ T7158] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3061.699959][ T7166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3061.712446][ T7165] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3061.730863][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3061.744932][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3061.760393][ T7167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3061.769416][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3061.777456][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3061.789413][ T7166] 8021q: adding VLAN 0 to HW filter on device team0 [ 3061.818213][ T7167] 8021q: adding VLAN 0 to HW filter on device team0 [ 3061.829528][ T7171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3061.836454][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3061.844952][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3061.864425][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3061.873346][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3061.882195][ T5269] bridge0: port 1(bridge_slave_0) entered blocking state [ 3061.889241][ T5269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3061.897731][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3061.906585][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3061.915397][ T5269] bridge0: port 1(bridge_slave_0) entered blocking state [ 3061.922542][ T5269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3061.930711][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3061.939562][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3061.948054][ T5269] bridge0: port 2(bridge_slave_1) entered blocking state [ 3061.955115][ T5269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3061.962970][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3061.972207][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3061.981870][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3061.989984][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3062.039174][ T7171] 8021q: adding VLAN 0 to HW filter on device team0 [ 3062.058207][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3062.066405][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3062.088620][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3062.097542][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3062.119523][ T1828] bridge0: port 2(bridge_slave_1) entered blocking state [ 3062.126597][ T1828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3062.140794][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3062.152704][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3062.162158][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3062.171369][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3062.181408][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3062.190315][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3062.198787][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3062.207319][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3062.215587][ T1828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3062.225446][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3062.253319][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3062.262572][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3062.272392][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3062.298458][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3062.307552][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3062.318620][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3062.327003][T30141] bridge0: port 1(bridge_slave_0) entered blocking state [ 3062.334116][T30141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3062.347591][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3062.356615][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3062.365439][T30141] bridge0: port 2(bridge_slave_1) entered blocking state [ 3062.372505][T30141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3062.380907][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3062.389345][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3062.417291][ T7167] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3062.431364][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3062.444124][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3062.463039][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3062.475635][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3062.487214][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3062.503389][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3062.520548][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3062.531948][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3062.541755][ T7166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3062.559307][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3062.573320][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3062.630199][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3062.651880][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3062.692844][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3062.702148][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3062.714500][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3062.723595][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3062.735977][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3062.744038][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3062.752021][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3062.761918][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3062.771462][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3062.784650][ T7166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3062.800631][ T7171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3062.851560][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3062.864536][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3062.903782][ T7171] 8021q: adding VLAN 0 to HW filter on device batadv0 07:58:54 executing program 0: 07:58:54 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, 0x0) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:54 executing program 0: 07:58:55 executing program 0: 07:58:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {0xffffffffffffffff, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:55 executing program 0: 07:58:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:55 executing program 0: 07:58:55 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:55 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'nr0\x00', 0xe701}) [ 3064.748240][ T7253] device nr0 entered promiscuous mode [ 3064.760819][ T7253] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 3065.098301][ T6711] device bridge_slave_1 left promiscuous mode [ 3065.108210][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3065.158439][ T6711] device bridge_slave_0 left promiscuous mode [ 3065.164717][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3066.258270][ T6711] device hsr_slave_0 left promiscuous mode [ 3066.317889][ T6711] device hsr_slave_1 left promiscuous mode [ 3066.405022][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3066.415019][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3066.424895][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3066.462064][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3066.560391][ T6711] bond0 (unregistering): Released all slaves [ 3066.694857][ T7256] IPVS: ftp: loaded support on port[0] = 21 [ 3066.746306][ T7256] chnl_net:caif_netlink_parms(): no params data found [ 3066.772059][ T7256] bridge0: port 1(bridge_slave_0) entered blocking state [ 3066.779317][ T7256] bridge0: port 1(bridge_slave_0) entered disabled state [ 3066.786953][ T7256] device bridge_slave_0 entered promiscuous mode [ 3066.794840][ T7256] bridge0: port 2(bridge_slave_1) entered blocking state [ 3066.802063][ T7256] bridge0: port 2(bridge_slave_1) entered disabled state [ 3066.809693][ T7256] device bridge_slave_1 entered promiscuous mode [ 3066.827042][ T7256] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3066.879489][ T7256] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3066.918285][ T7256] team0: Port device team_slave_0 added [ 3066.925202][ T7256] team0: Port device team_slave_1 added [ 3067.030228][ T7256] device hsr_slave_0 entered promiscuous mode [ 3067.078199][ T7256] device hsr_slave_1 entered promiscuous mode [ 3067.124454][ T7259] IPVS: ftp: loaded support on port[0] = 21 [ 3067.146093][ T7256] bridge0: port 2(bridge_slave_1) entered blocking state [ 3067.153204][ T7256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3067.160609][ T7256] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.167640][ T7256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3067.244535][ T7256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3067.283638][ T7259] chnl_net:caif_netlink_parms(): no params data found [ 3067.303698][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3067.313174][ T7916] bridge0: port 1(bridge_slave_0) entered disabled state [ 3067.321821][ T7916] bridge0: port 2(bridge_slave_1) entered disabled state [ 3067.347232][ T7256] 8021q: adding VLAN 0 to HW filter on device team0 [ 3067.354959][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.366031][ T7259] bridge0: port 1(bridge_slave_0) entered disabled state [ 3067.373748][ T7259] device bridge_slave_0 entered promiscuous mode [ 3067.384304][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 3067.391684][ T7259] bridge0: port 2(bridge_slave_1) entered disabled state [ 3067.402800][ T7259] device bridge_slave_1 entered promiscuous mode [ 3067.411268][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3067.420196][T26081] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.427264][T26081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3067.448803][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3067.457143][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 3067.464325][ T7916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3067.474874][ T7259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3067.487250][ T7259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3067.514870][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3067.536941][ T7259] team0: Port device team_slave_0 added [ 3067.553587][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3067.563088][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3067.576337][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3067.586152][ T7259] team0: Port device team_slave_1 added [ 3067.597131][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3067.616536][ T7256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3067.670767][ T7259] device hsr_slave_0 entered promiscuous mode [ 3067.728317][ T7259] device hsr_slave_1 entered promiscuous mode [ 3067.777980][ T7259] debugfs: Directory 'hsr0' with parent '/' already present! [ 3067.794675][ T7256] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3067.806725][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3067.814639][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3067.862995][ T7259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3067.875597][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3067.884224][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3067.895202][ T7259] 8021q: adding VLAN 0 to HW filter on device team0 [ 3067.918336][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3067.932472][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3067.952301][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.959380][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3067.967914][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3067.981391][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3067.990081][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3067.999088][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 3068.006182][ T9029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3068.014058][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3068.031111][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3068.040174][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3068.048993][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3068.058053][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3068.066830][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3068.356386][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3068.364561][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3068.373506][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3068.382202][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3068.391073][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3068.400748][ T7259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3068.512620][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3068.520739][T26081] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3068.532919][ T7259] 8021q: adding VLAN 0 to HW filter on device batadv0 07:58:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {0xffffffffffffffff, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:58:59 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:58:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:58:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x1, 0x84) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) dup2(r2, r3) 07:59:00 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0x3}, [{}, {}, {}, {}, {}, {}, {}]}, 0x5c, 0x0) 07:59:00 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:59:00 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x0, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:59:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:00 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:59:00 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:59:00 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:59:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3070.993486][ T6711] device bridge_slave_1 left promiscuous mode [ 3071.002562][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3071.078479][ T6711] device bridge_slave_0 left promiscuous mode [ 3071.084755][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3071.159224][ T6711] device bridge_slave_1 left promiscuous mode [ 3071.165530][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3071.238479][ T6711] device bridge_slave_0 left promiscuous mode [ 3071.244886][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3071.299347][ T6711] device bridge_slave_1 left promiscuous mode [ 3071.305522][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3071.378957][ T6711] device bridge_slave_0 left promiscuous mode [ 3071.385126][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3071.439247][ T6711] device bridge_slave_1 left promiscuous mode [ 3071.445401][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3071.478874][ T6711] device bridge_slave_0 left promiscuous mode [ 3071.485087][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3074.018177][ T6711] device hsr_slave_0 left promiscuous mode [ 3074.057957][ T6711] device hsr_slave_1 left promiscuous mode [ 3074.124466][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3074.134795][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3074.144694][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3074.191211][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3074.248974][ T6711] bond0 (unregistering): Released all slaves [ 3074.388051][ T6711] device hsr_slave_0 left promiscuous mode [ 3074.428224][ T6711] device hsr_slave_1 left promiscuous mode [ 3074.474886][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3074.484967][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3074.495153][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3074.562143][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3074.649094][ T6711] bond0 (unregistering): Released all slaves [ 3074.788422][ T6711] device hsr_slave_0 left promiscuous mode [ 3074.827917][ T6711] device hsr_slave_1 left promiscuous mode [ 3074.903521][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3074.914007][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3074.924469][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3074.981797][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3075.079570][ T6711] bond0 (unregistering): Released all slaves [ 3075.228208][ T6711] device hsr_slave_0 left promiscuous mode [ 3075.267932][ T6711] device hsr_slave_1 left promiscuous mode [ 3075.334139][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3075.344640][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3075.354744][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3075.421582][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3075.498411][ T6711] bond0 (unregistering): Released all slaves [ 3075.606931][ T7311] IPVS: ftp: loaded support on port[0] = 21 [ 3075.606951][ T7309] IPVS: ftp: loaded support on port[0] = 21 [ 3075.694122][ T7309] chnl_net:caif_netlink_parms(): no params data found [ 3075.749492][ T7309] bridge0: port 1(bridge_slave_0) entered blocking state [ 3075.756551][ T7309] bridge0: port 1(bridge_slave_0) entered disabled state [ 3075.764790][ T7309] device bridge_slave_0 entered promiscuous mode [ 3075.774344][ T7309] bridge0: port 2(bridge_slave_1) entered blocking state [ 3075.781533][ T7309] bridge0: port 2(bridge_slave_1) entered disabled state [ 3075.789305][ T7309] device bridge_slave_1 entered promiscuous mode [ 3075.806281][ T7309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3075.822125][ T7309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3075.835431][ T7311] chnl_net:caif_netlink_parms(): no params data found [ 3075.848935][ T7309] team0: Port device team_slave_0 added [ 3075.858311][ T7309] team0: Port device team_slave_1 added [ 3075.884461][ T7311] bridge0: port 1(bridge_slave_0) entered blocking state [ 3075.891589][ T7311] bridge0: port 1(bridge_slave_0) entered disabled state [ 3075.899783][ T7311] device bridge_slave_0 entered promiscuous mode [ 3075.911599][ T7311] bridge0: port 2(bridge_slave_1) entered blocking state [ 3075.918718][ T7311] bridge0: port 2(bridge_slave_1) entered disabled state [ 3075.926595][ T7311] device bridge_slave_1 entered promiscuous mode [ 3075.980410][ T7309] device hsr_slave_0 entered promiscuous mode [ 3076.018291][ T7309] device hsr_slave_1 entered promiscuous mode [ 3076.057914][ T7309] debugfs: Directory 'hsr0' with parent '/' already present! [ 3076.076300][ T7311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3076.086867][ T7311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3076.106570][ T7311] team0: Port device team_slave_0 added [ 3076.113372][ T7311] team0: Port device team_slave_1 added [ 3076.190262][ T7311] device hsr_slave_0 entered promiscuous mode [ 3076.248632][ T7311] device hsr_slave_1 entered promiscuous mode [ 3076.317897][ T7311] debugfs: Directory 'hsr0' with parent '/' already present! [ 3076.334920][ T7309] bridge0: port 2(bridge_slave_1) entered blocking state [ 3076.342148][ T7309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3076.349573][ T7309] bridge0: port 1(bridge_slave_0) entered blocking state [ 3076.356606][ T7309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3076.372365][ T7311] bridge0: port 2(bridge_slave_1) entered blocking state [ 3076.379535][ T7311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3076.391128][ T7311] bridge0: port 1(bridge_slave_0) entered blocking state [ 3076.398189][ T7311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3076.637161][ T7311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3076.654867][ T7916] bridge0: port 1(bridge_slave_0) entered disabled state [ 3076.666077][ T7916] bridge0: port 2(bridge_slave_1) entered disabled state [ 3076.677707][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3076.689580][ T7916] bridge0: port 1(bridge_slave_0) entered disabled state [ 3076.697615][ T7916] bridge0: port 2(bridge_slave_1) entered disabled state [ 3076.716439][ T7311] 8021q: adding VLAN 0 to HW filter on device team0 [ 3076.729710][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3076.741287][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3076.750413][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 3076.757634][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3076.789247][ T7309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3076.796696][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3076.811992][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3076.820974][ T5608] bridge0: port 2(bridge_slave_1) entered blocking state [ 3076.828131][ T5608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3076.840466][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3076.865800][ T7309] 8021q: adding VLAN 0 to HW filter on device team0 [ 3076.874551][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3076.886826][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3076.896849][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3076.910430][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3076.921897][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3076.931842][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3076.942566][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3076.952337][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3076.962439][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3076.974727][ T7311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3076.986695][ T7311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3076.998534][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3077.006608][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3077.016006][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3077.026868][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3077.039975][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3077.049507][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 3077.056573][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3077.082322][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3077.091780][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3077.100672][ T5608] bridge0: port 2(bridge_slave_1) entered blocking state [ 3077.107695][ T5608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3077.115541][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3077.124696][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3077.133827][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3077.143155][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3077.152085][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3077.159558][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3077.166967][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3077.175708][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3077.184698][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3077.193170][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3077.201668][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3077.210305][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3077.219174][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3077.230227][ T7309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3077.241974][ T7311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3077.263096][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3077.271117][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3077.283734][ T7309] 8021q: adding VLAN 0 to HW filter on device batadv0 07:59:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:59:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {0xffffffffffffffff, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:09 executing program 0: clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = gettid() r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) tkill(r1, 0x9) 07:59:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:59:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {0xffffffffffffffff, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) 07:59:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {0xffffffffffffffff, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3080.517687][ T7357] IPVS: ftp: loaded support on port[0] = 21 [ 3080.656751][ T7357] chnl_net:caif_netlink_parms(): no params data found [ 3080.774126][ T7357] bridge0: port 1(bridge_slave_0) entered blocking state [ 3080.781558][ T7357] bridge0: port 1(bridge_slave_0) entered disabled state [ 3080.789631][ T7357] device bridge_slave_0 entered promiscuous mode [ 3080.797238][ T7357] bridge0: port 2(bridge_slave_1) entered blocking state [ 3080.804927][ T7357] bridge0: port 2(bridge_slave_1) entered disabled state [ 3080.813030][ T7357] device bridge_slave_1 entered promiscuous mode [ 3080.830102][ T7357] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3080.932464][ T7357] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3080.950766][ T7357] team0: Port device team_slave_0 added [ 3080.957223][ T7357] team0: Port device team_slave_1 added [ 3081.103280][ T7357] device hsr_slave_0 entered promiscuous mode [ 3081.168337][ T7357] device hsr_slave_1 entered promiscuous mode [ 3081.207830][ T7357] debugfs: Directory 'hsr0' with parent '/' already present! [ 3081.322592][ T7363] IPVS: ftp: loaded support on port[0] = 21 [ 3081.335713][ T7362] IPVS: ftp: loaded support on port[0] = 21 [ 3081.338157][ T7364] IPVS: ftp: loaded support on port[0] = 21 [ 3081.349459][ T6711] device bridge_slave_1 left promiscuous mode [ 3081.355794][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3081.428531][ T6711] device bridge_slave_0 left promiscuous mode [ 3081.434784][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3081.489411][ T6711] device bridge_slave_1 left promiscuous mode [ 3081.495666][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3081.558593][ T6711] device bridge_slave_0 left promiscuous mode [ 3081.564821][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3081.629278][ T6711] device bridge_slave_1 left promiscuous mode [ 3081.635499][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3081.698530][ T6711] device bridge_slave_0 left promiscuous mode [ 3081.704853][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3081.759067][ T6711] device bridge_slave_1 left promiscuous mode [ 3081.765226][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3081.818416][ T6711] device bridge_slave_0 left promiscuous mode [ 3081.824610][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3084.297981][ T6711] device hsr_slave_0 left promiscuous mode [ 3084.377929][ T6711] device hsr_slave_1 left promiscuous mode [ 3084.444223][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3084.454347][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3084.463773][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3084.521553][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3084.577818][ T6711] bond0 (unregistering): Released all slaves [ 3084.698138][ T6711] device hsr_slave_0 left promiscuous mode [ 3084.737899][ T6711] device hsr_slave_1 left promiscuous mode [ 3084.784796][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3084.794749][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3084.805373][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3084.851068][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3084.910018][ T6711] bond0 (unregistering): Released all slaves [ 3085.078134][ T6711] device hsr_slave_0 left promiscuous mode [ 3085.117956][ T6711] device hsr_slave_1 left promiscuous mode [ 3085.174266][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3085.184717][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3085.194698][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3085.232358][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3085.329194][ T6711] bond0 (unregistering): Released all slaves [ 3085.498073][ T6711] device hsr_slave_0 left promiscuous mode [ 3085.547949][ T6711] device hsr_slave_1 left promiscuous mode [ 3085.594118][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3085.604228][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3085.614859][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3085.651541][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3085.709074][ T6711] bond0 (unregistering): Released all slaves [ 3085.880405][ T7357] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3085.915595][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3085.923352][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3085.946427][ T7357] 8021q: adding VLAN 0 to HW filter on device team0 [ 3085.994626][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3086.003370][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3086.011877][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 3086.018916][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3086.034037][ T7362] chnl_net:caif_netlink_parms(): no params data found [ 3086.051205][ T7363] chnl_net:caif_netlink_parms(): no params data found [ 3086.060281][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3086.090940][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3086.100174][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3086.108761][ T3803] bridge0: port 2(bridge_slave_1) entered blocking state [ 3086.115786][ T3803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3086.123938][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3086.133127][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3086.142293][ T7362] bridge0: port 1(bridge_slave_0) entered blocking state [ 3086.149570][ T7362] bridge0: port 1(bridge_slave_0) entered disabled state [ 3086.157151][ T7362] device bridge_slave_0 entered promiscuous mode [ 3086.164550][ T7364] chnl_net:caif_netlink_parms(): no params data found [ 3086.180870][ T7362] bridge0: port 2(bridge_slave_1) entered blocking state [ 3086.188057][ T7362] bridge0: port 2(bridge_slave_1) entered disabled state [ 3086.195801][ T7362] device bridge_slave_1 entered promiscuous mode [ 3086.214149][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3086.223119][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3086.232190][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3086.261816][ T7362] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3086.272643][ T7362] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3086.282713][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3086.291772][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3086.309629][ T7363] bridge0: port 1(bridge_slave_0) entered blocking state [ 3086.316799][ T7363] bridge0: port 1(bridge_slave_0) entered disabled state [ 3086.324500][ T7363] device bridge_slave_0 entered promiscuous mode [ 3086.335887][ T7363] bridge0: port 2(bridge_slave_1) entered blocking state [ 3086.343348][ T7363] bridge0: port 2(bridge_slave_1) entered disabled state [ 3086.352324][ T7363] device bridge_slave_1 entered promiscuous mode [ 3086.371992][ T7357] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3086.382568][ T7357] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3086.393768][ T7364] bridge0: port 1(bridge_slave_0) entered blocking state [ 3086.401133][ T7364] bridge0: port 1(bridge_slave_0) entered disabled state [ 3086.409070][ T7364] device bridge_slave_0 entered promiscuous mode [ 3086.416310][ T7364] bridge0: port 2(bridge_slave_1) entered blocking state [ 3086.423563][ T7364] bridge0: port 2(bridge_slave_1) entered disabled state [ 3086.431405][ T7364] device bridge_slave_1 entered promiscuous mode [ 3086.447209][ T7362] team0: Port device team_slave_0 added [ 3086.453972][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3086.462482][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3086.471446][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3086.479723][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3086.491377][ T7363] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3086.511985][ T7362] team0: Port device team_slave_1 added [ 3086.519655][ T7364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3086.529231][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3086.539567][ T7363] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3086.554576][ T7364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3086.574668][ T7363] team0: Port device team_slave_0 added [ 3086.581576][ T7363] team0: Port device team_slave_1 added [ 3086.595049][ T7364] team0: Port device team_slave_0 added [ 3086.602083][ T7364] team0: Port device team_slave_1 added [ 3086.680298][ T7363] device hsr_slave_0 entered promiscuous mode [ 3086.718265][ T7363] device hsr_slave_1 entered promiscuous mode [ 3086.777482][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3086.785434][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3086.840238][ T7364] device hsr_slave_0 entered promiscuous mode [ 3086.898316][ T7364] device hsr_slave_1 entered promiscuous mode [ 3086.937871][ T7364] debugfs: Directory 'hsr0' with parent '/' already present! [ 3086.980362][ T7362] device hsr_slave_0 entered promiscuous mode [ 3087.018232][ T7362] device hsr_slave_1 entered promiscuous mode [ 3087.057857][ T7362] debugfs: Directory 'hsr0' with parent '/' already present! [ 3087.072317][ T7357] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3087.387422][ T7363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3087.416212][ T7364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3087.453872][ T7364] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.466894][ T7362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3087.474502][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3087.485853][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3087.494537][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3087.505374][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3087.516304][ T7363] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.528118][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3087.536907][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3087.554367][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 3087.562999][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3087.601224][ T7362] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.620291][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3087.630242][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3087.645568][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3087.667289][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 3087.674384][ T9029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3087.698512][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3087.707104][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3087.733029][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3087.740117][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3087.763823][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3087.781416][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3087.799135][ T9029] bridge0: port 2(bridge_slave_1) entered blocking state [ 3087.806206][ T9029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3087.829745][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3087.848332][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3087.856162][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3087.869348][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3087.882424][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3087.901181][ T7363] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3087.911774][ T7363] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3087.926560][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3087.935554][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3087.944797][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3087.958569][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3087.967352][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3087.976415][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3087.984752][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3087.993336][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3088.001699][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3088.009990][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3088.018736][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3088.027125][ T7916] bridge0: port 1(bridge_slave_0) entered blocking state [ 3088.034238][ T7916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3088.042276][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3088.050536][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3088.058276][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3088.081112][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3088.090157][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3088.099782][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3088.108388][ T5269] bridge0: port 2(bridge_slave_1) entered blocking state [ 3088.115419][ T5269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3088.123923][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3088.132777][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3088.142097][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3088.150602][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3088.169490][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3088.178255][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3088.187111][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3088.196044][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3088.205073][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3088.213737][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3088.221242][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3088.228794][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3088.244827][ T7363] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3088.252699][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3088.261754][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3088.281708][ T7364] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3088.294400][ T7364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3088.304417][ T7362] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3088.320001][ T7362] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3088.332482][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3088.341383][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3088.350521][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3088.359042][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3088.367576][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3088.379753][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3088.389686][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3088.399043][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3088.407491][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3088.437813][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3088.445254][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3088.472400][ T7364] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3088.549079][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3088.556714][ T5269] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3088.566170][ T7362] 8021q: adding VLAN 0 to HW filter on device batadv0 07:59:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000380), 0x313) 07:59:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) fstat(0xffffffffffffffff, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000380), 0x313) 07:59:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {0xffffffffffffffff, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000380), 0x313) 07:59:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, 0x0, 0x0) 07:59:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, 0x0, 0x0) 07:59:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {0xffffffffffffffff, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3091.580671][ T7429] IPVS: ftp: loaded support on port[0] = 21 [ 3091.744369][ T7429] chnl_net:caif_netlink_parms(): no params data found [ 3091.769281][ T7429] bridge0: port 1(bridge_slave_0) entered blocking state [ 3091.776506][ T7429] bridge0: port 1(bridge_slave_0) entered disabled state [ 3091.784253][ T7429] device bridge_slave_0 entered promiscuous mode [ 3091.905436][ T7429] bridge0: port 2(bridge_slave_1) entered blocking state [ 3091.912719][ T7429] bridge0: port 2(bridge_slave_1) entered disabled state [ 3091.923497][ T7429] device bridge_slave_1 entered promiscuous mode [ 3091.939634][ T7429] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3091.952660][ T7429] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3092.163881][ T7429] team0: Port device team_slave_0 added [ 3092.182290][ T7429] team0: Port device team_slave_1 added [ 3092.201938][ T7435] IPVS: ftp: loaded support on port[0] = 21 [ 3092.216729][ T7434] IPVS: ftp: loaded support on port[0] = 21 [ 3092.390199][ T7429] device hsr_slave_0 entered promiscuous mode [ 3092.448284][ T7429] device hsr_slave_1 entered promiscuous mode [ 3092.507971][ T7429] debugfs: Directory 'hsr0' with parent '/' already present! [ 3092.523916][ T7436] IPVS: ftp: loaded support on port[0] = 21 [ 3092.693440][ T7429] bridge0: port 2(bridge_slave_1) entered blocking state [ 3092.700553][ T7429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3092.707856][ T7429] bridge0: port 1(bridge_slave_0) entered blocking state [ 3092.714879][ T7429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3092.853869][T26317] bridge0: port 1(bridge_slave_0) entered disabled state [ 3092.862086][T26317] bridge0: port 2(bridge_slave_1) entered disabled state [ 3092.894939][ T6711] device bridge_slave_1 left promiscuous mode [ 3092.901356][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3092.948561][ T6711] device bridge_slave_0 left promiscuous mode [ 3092.954761][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3093.019151][ T6711] device bridge_slave_1 left promiscuous mode [ 3093.025333][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3093.078301][ T6711] device bridge_slave_0 left promiscuous mode [ 3093.084563][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3093.149242][ T6711] device bridge_slave_1 left promiscuous mode [ 3093.155448][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3093.218602][ T6711] device bridge_slave_0 left promiscuous mode [ 3093.224815][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3093.279422][ T6711] device bridge_slave_1 left promiscuous mode [ 3093.285608][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3093.338381][ T6711] device bridge_slave_0 left promiscuous mode [ 3093.344548][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3093.399463][ T6711] device bridge_slave_1 left promiscuous mode [ 3093.405703][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3093.458325][ T6711] device bridge_slave_0 left promiscuous mode [ 3093.464669][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3096.518298][ T6711] device hsr_slave_0 left promiscuous mode [ 3096.557945][ T6711] device hsr_slave_1 left promiscuous mode [ 3096.613872][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3096.624687][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3096.634317][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3096.690976][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3096.768484][ T6711] bond0 (unregistering): Released all slaves [ 3096.898126][ T6711] device hsr_slave_0 left promiscuous mode [ 3096.940878][ T6711] device hsr_slave_1 left promiscuous mode [ 3096.984026][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3096.994504][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3097.004440][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3097.071150][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3097.137856][ T6711] bond0 (unregistering): Released all slaves [ 3097.288213][ T6711] device hsr_slave_0 left promiscuous mode [ 3097.357874][ T6711] device hsr_slave_1 left promiscuous mode [ 3097.423818][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3097.434552][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3097.444582][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3097.484124][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3097.558803][ T6711] bond0 (unregistering): Released all slaves [ 3097.718188][ T6711] device hsr_slave_0 left promiscuous mode [ 3097.758015][ T6711] device hsr_slave_1 left promiscuous mode [ 3097.804591][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3097.814756][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3097.824661][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3097.871367][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3097.948267][ T6711] bond0 (unregistering): Released all slaves [ 3098.108080][ T6711] device hsr_slave_0 left promiscuous mode [ 3098.157912][ T6711] device hsr_slave_1 left promiscuous mode [ 3098.204121][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3098.213968][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3098.223942][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3098.260819][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3098.338419][ T6711] bond0 (unregistering): Released all slaves [ 3098.485765][ T7436] chnl_net:caif_netlink_parms(): no params data found [ 3098.541749][ T7434] chnl_net:caif_netlink_parms(): no params data found [ 3098.570081][ T7436] bridge0: port 1(bridge_slave_0) entered blocking state [ 3098.577163][ T7436] bridge0: port 1(bridge_slave_0) entered disabled state [ 3098.585104][ T7436] device bridge_slave_0 entered promiscuous mode [ 3098.597787][ T7436] bridge0: port 2(bridge_slave_1) entered blocking state [ 3098.604828][ T7436] bridge0: port 2(bridge_slave_1) entered disabled state [ 3098.612598][ T7436] device bridge_slave_1 entered promiscuous mode [ 3098.631616][ T7436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3098.647373][ T7436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3098.663110][ T7429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3098.689369][ T7436] team0: Port device team_slave_0 added [ 3098.695054][ T7435] chnl_net:caif_netlink_parms(): no params data found [ 3098.709452][ T7436] team0: Port device team_slave_1 added [ 3098.732991][ T7434] bridge0: port 1(bridge_slave_0) entered blocking state [ 3098.740126][ T7434] bridge0: port 1(bridge_slave_0) entered disabled state [ 3098.747845][ T7434] device bridge_slave_0 entered promiscuous mode [ 3098.755522][ T7434] bridge0: port 2(bridge_slave_1) entered blocking state [ 3098.762834][ T7434] bridge0: port 2(bridge_slave_1) entered disabled state [ 3098.770657][ T7434] device bridge_slave_1 entered promiscuous mode [ 3098.782062][ T7435] bridge0: port 1(bridge_slave_0) entered blocking state [ 3098.789288][ T7435] bridge0: port 1(bridge_slave_0) entered disabled state [ 3098.797197][ T7435] device bridge_slave_0 entered promiscuous mode [ 3098.805553][ T7435] bridge0: port 2(bridge_slave_1) entered blocking state [ 3098.812759][ T7435] bridge0: port 2(bridge_slave_1) entered disabled state [ 3098.820504][ T7435] device bridge_slave_1 entered promiscuous mode [ 3098.900386][ T7436] device hsr_slave_0 entered promiscuous mode [ 3098.940912][ T7436] device hsr_slave_1 entered promiscuous mode [ 3098.989713][ T7434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3099.001762][ T7435] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3099.018941][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3099.026653][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3099.035545][ T7434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3099.046204][ T7435] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3099.061590][ T7429] 8021q: adding VLAN 0 to HW filter on device team0 [ 3099.083494][ T7434] team0: Port device team_slave_0 added [ 3099.090224][ T7435] team0: Port device team_slave_0 added [ 3099.096620][ T7434] team0: Port device team_slave_1 added [ 3099.106323][ T7435] team0: Port device team_slave_1 added [ 3099.116788][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3099.125744][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3099.134205][ T3803] bridge0: port 1(bridge_slave_0) entered blocking state [ 3099.141245][ T3803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3099.169964][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3099.179083][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3099.187295][ T3803] bridge0: port 2(bridge_slave_1) entered blocking state [ 3099.194426][ T3803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3099.202398][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3099.211747][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3099.220576][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3099.229177][ T3803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3099.289921][ T7434] device hsr_slave_0 entered promiscuous mode [ 3099.338329][ T7434] device hsr_slave_1 entered promiscuous mode [ 3099.377843][ T7434] debugfs: Directory 'hsr0' with parent '/' already present! [ 3099.396072][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3099.405684][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3099.415129][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3099.480090][ T7435] device hsr_slave_0 entered promiscuous mode [ 3099.518443][ T7435] device hsr_slave_1 entered promiscuous mode [ 3099.557907][ T7435] debugfs: Directory 'hsr0' with parent '/' already present! [ 3099.609559][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3099.618786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3099.634083][ T7429] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3099.647861][ T7429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3099.748304][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3099.756715][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3099.781124][ T7429] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3099.909551][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3099.917050][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3099.946130][ T7434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3099.964033][ T7436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3099.992824][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3100.008607][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3100.016460][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3100.027199][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3100.037425][ T7434] 8021q: adding VLAN 0 to HW filter on device team0 [ 3100.054710][ T7436] 8021q: adding VLAN 0 to HW filter on device team0 [ 3100.073313][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3100.088893][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3100.097260][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3100.104388][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3100.136080][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3100.153189][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3100.164657][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3100.171711][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3100.188399][ T7435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3100.201503][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3100.209668][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3100.218250][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3100.226919][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3100.239037][ T5607] bridge0: port 2(bridge_slave_1) entered blocking state [ 3100.246172][ T5607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3100.257050][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3100.267046][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3100.279631][ T5607] bridge0: port 2(bridge_slave_1) entered blocking state [ 3100.286798][ T5607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3100.310826][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3100.322247][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3100.345383][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3100.362834][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3100.381000][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3100.400292][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3100.419477][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3100.435994][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3100.452519][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3100.464450][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3100.483696][ T7434] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3100.495411][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3100.517632][ T7435] 8021q: adding VLAN 0 to HW filter on device team0 [ 3100.528335][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3100.536712][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3100.548050][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3100.555973][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3100.567393][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3100.576335][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3100.585145][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3100.594130][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3100.603124][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3100.612678][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3100.634908][ T7434] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3100.644450][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3100.653381][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3100.662316][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3100.671438][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3100.679979][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3100.687429][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3100.694939][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3100.703708][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3100.712210][ T5609] bridge0: port 1(bridge_slave_0) entered blocking state [ 3100.719313][ T5609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3100.727445][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3100.736167][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3100.744729][ T5609] bridge0: port 2(bridge_slave_1) entered blocking state [ 3100.751847][ T5609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3100.763073][ T7436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3100.771867][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3100.780214][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3100.802655][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3100.812098][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3100.820846][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3100.830653][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3100.839416][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3100.848884][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3100.863103][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3100.871957][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3100.880837][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3100.888719][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3100.899806][ T7436] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3100.913856][ T7435] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3100.925921][ T7435] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3100.936436][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3100.945157][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3100.960905][ T7435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3100.973713][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3100.993552][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:59:32 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000180)={[{0x0, 0xfffd, 0x1f, 0x0, 0x7e, 0xfe, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb9}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xff}]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000580)="240000004a005f0014f9f407000909000a00800000000300000e0000080002000000", 0x22) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000280)={0x4, 0x8, 0x2, 0x0, 0x7fff, 0x4, 0x8, 0xea, 0x3, 0x1, 0x8, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x3, 0x2}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000040)={0x0, 'team_slave_1\x00', {}, 0x2}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x100}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:59:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:32 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\x89\xb2\x04K\x98\x93?\x88\x97\x94YC\xc4\xc4I\x1a+l+\x1aQ\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xee \xabN\xae\xc9\xbd\xd3\x84\xf5\f\xf8\xb0\xa8\xb3\xe2R\xd2\xcd\xd8\xc6\x86\xb0\xe3\x1a\xc4q\xbe\xe8\xa1>\xf9\xc9\xf5\xd9^\xc7\xccH\x0e\xac\xe9\x1e\xea\x19\xb0\x85', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) read$FUSE(r0, 0x0, 0x0) 07:59:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) fstat(0xffffffffffffffff, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:32 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r3, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) write$binfmt_misc(r3, &(0x7f0000000200)={'syz1', "93396da8f41f8325f603f7a5460b7410b57f3101015218aefd3edf879148ec7ededc20b448e464fa52be65448c908a2f20a6252568a93bbd6e2a7d2f517197cc3dc25d17ae130946e49cf7a041e06557c168314a4f4c282067c3bc6eb13c3a"}, 0x63) recvmmsg(r2, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0x0, 0x0) r7 = dup(r6) ioctl$sock_inet6_tcp_SIOCINQ(r7, 0x4c81, 0xfffffffffffffffe) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0x0, 0x0) r9 = dup(r8) ioctl$sock_inet6_tcp_SIOCINQ(r9, 0x4c81, 0xfffffffffffffffe) ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) openat(r7, &(0x7f0000000140)='./file0\x00', 0x400000, 0x160) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000400)="ff28703182a5017f0b7abc39c5b59852c5e79fe7b6279f61fe98dd44b245b0d651b34c4d82c6dd93a4bbd513f6c376d7ba60bab163f1f67196564f2f063253c1014f69e663ae753b3f25ffb3867c440e010000000e3ef497a9a6a3b7aee18e028b", 0x61, 0x4, 0x0, 0x0) statfs(0x0, &(0x7f0000000340)=""/160) 07:59:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r4, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r10, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r5, 0x8080}, {r6, 0x14a}, {r7, 0x800c}, {r8, 0xcb21159eda11a0c8}, {r9, 0x100}, {0xffffffffffffffff, 0x1004}, {r10, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3101.922246][ T7494] devpts: called with bogus options 07:59:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0x6f0c9f4cda96a752, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x20008005}, 0x60) 07:59:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@loopback}, 0xffdc) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) wait4(0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:59:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r4, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r10, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r5, 0x8080}, {r6, 0x14a}, {r7, 0x800c}, {r8, 0xcb21159eda11a0c8}, {r9, 0x100}, {0xffffffffffffffff, 0x1004}, {r10, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) [ 3103.990109][ T7503] IPVS: ftp: loaded support on port[0] = 21 [ 3104.039211][ T7503] chnl_net:caif_netlink_parms(): no params data found [ 3104.157243][ T7503] bridge0: port 1(bridge_slave_0) entered blocking state [ 3104.164524][ T7503] bridge0: port 1(bridge_slave_0) entered disabled state [ 3104.172495][ T7503] device bridge_slave_0 entered promiscuous mode [ 3104.180233][ T7503] bridge0: port 2(bridge_slave_1) entered blocking state [ 3104.187386][ T7503] bridge0: port 2(bridge_slave_1) entered disabled state [ 3104.195433][ T7503] device bridge_slave_1 entered promiscuous mode [ 3104.304612][ T7503] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3104.315722][ T7503] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3104.423464][ T7503] team0: Port device team_slave_0 added [ 3104.438426][ T7503] team0: Port device team_slave_1 added [ 3104.658938][ T7509] IPVS: ftp: loaded support on port[0] = 21 [ 3104.663236][ T7510] IPVS: ftp: loaded support on port[0] = 21 [ 3104.672377][ T7508] IPVS: ftp: loaded support on port[0] = 21 [ 3104.730295][ T7503] device hsr_slave_0 entered promiscuous mode [ 3104.768190][ T7503] device hsr_slave_1 entered promiscuous mode [ 3104.807884][ T7503] debugfs: Directory 'hsr0' with parent '/' already present! [ 3104.973710][ T7503] bridge0: port 2(bridge_slave_1) entered blocking state [ 3104.980800][ T7503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3104.988141][ T7503] bridge0: port 1(bridge_slave_0) entered blocking state [ 3104.995185][ T7503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3105.122084][ T5609] bridge0: port 1(bridge_slave_0) entered disabled state [ 3105.129865][ T5609] bridge0: port 2(bridge_slave_1) entered disabled state [ 3105.285711][ T7508] chnl_net:caif_netlink_parms(): no params data found [ 3105.336743][ T7508] bridge0: port 1(bridge_slave_0) entered blocking state [ 3105.343871][ T7508] bridge0: port 1(bridge_slave_0) entered disabled state [ 3105.351589][ T7508] device bridge_slave_0 entered promiscuous mode [ 3105.361179][ T7509] chnl_net:caif_netlink_parms(): no params data found [ 3105.382165][ T7508] bridge0: port 2(bridge_slave_1) entered blocking state [ 3105.389267][ T7508] bridge0: port 2(bridge_slave_1) entered disabled state [ 3105.397017][ T7508] device bridge_slave_1 entered promiscuous mode [ 3105.415651][ T7510] chnl_net:caif_netlink_parms(): no params data found [ 3105.453131][ T7508] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3105.462273][ T7509] bridge0: port 1(bridge_slave_0) entered blocking state [ 3105.470239][ T7509] bridge0: port 1(bridge_slave_0) entered disabled state [ 3105.478253][ T7509] device bridge_slave_0 entered promiscuous mode [ 3105.490383][ T7510] bridge0: port 1(bridge_slave_0) entered blocking state [ 3105.497429][ T7510] bridge0: port 1(bridge_slave_0) entered disabled state [ 3105.505286][ T7510] device bridge_slave_0 entered promiscuous mode [ 3105.516143][ T7508] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3105.530692][ T7509] bridge0: port 2(bridge_slave_1) entered blocking state [ 3105.537711][ T7509] bridge0: port 2(bridge_slave_1) entered disabled state [ 3105.545401][ T7509] device bridge_slave_1 entered promiscuous mode [ 3105.552463][ T7510] bridge0: port 2(bridge_slave_1) entered blocking state [ 3105.561175][ T7510] bridge0: port 2(bridge_slave_1) entered disabled state [ 3105.570817][ T7510] device bridge_slave_1 entered promiscuous mode [ 3105.580818][ T7503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3105.597492][ T7508] team0: Port device team_slave_0 added [ 3105.612408][ T6711] device bridge_slave_1 left promiscuous mode [ 3105.618711][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3105.688622][ T6711] device bridge_slave_0 left promiscuous mode [ 3105.694828][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3105.749095][ T6711] device bridge_slave_1 left promiscuous mode [ 3105.755305][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3105.808558][ T6711] device bridge_slave_0 left promiscuous mode [ 3105.814728][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3105.878843][ T6711] device bridge_slave_1 left promiscuous mode [ 3105.885136][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3105.938470][ T6711] device bridge_slave_0 left promiscuous mode [ 3105.944685][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3106.008939][ T6711] device bridge_slave_1 left promiscuous mode [ 3106.015312][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3106.078490][ T6711] device bridge_slave_0 left promiscuous mode [ 3106.084693][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3108.588334][ T6711] device hsr_slave_0 left promiscuous mode [ 3108.638036][ T6711] device hsr_slave_1 left promiscuous mode [ 3108.684536][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3108.694907][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3108.708385][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3108.751587][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3108.826896][ T6711] bond0 (unregistering): Released all slaves [ 3108.958242][ T6711] device hsr_slave_0 left promiscuous mode [ 3108.998084][ T6711] device hsr_slave_1 left promiscuous mode [ 3109.044400][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3109.054460][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3109.064498][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3109.140851][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3109.197637][ T6711] bond0 (unregistering): Released all slaves [ 3109.328230][ T6711] device hsr_slave_0 left promiscuous mode [ 3109.367993][ T6711] device hsr_slave_1 left promiscuous mode [ 3109.443395][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3109.454232][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3109.464348][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3109.501627][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3109.588730][ T6711] bond0 (unregistering): Released all slaves [ 3109.728173][ T6711] device hsr_slave_0 left promiscuous mode [ 3109.788115][ T6711] device hsr_slave_1 left promiscuous mode [ 3109.833498][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3109.843898][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3109.853473][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3109.931729][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3109.996645][ T6711] bond0 (unregistering): Released all slaves [ 3110.096579][ T7509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3110.106529][ T7508] team0: Port device team_slave_1 added [ 3110.121737][ T7503] 8021q: adding VLAN 0 to HW filter on device team0 [ 3110.131441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3110.139716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3110.148651][ T7509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3110.159118][ T7510] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3110.189871][ T7510] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3110.239900][ T7508] device hsr_slave_0 entered promiscuous mode [ 3110.278201][ T7508] device hsr_slave_1 entered promiscuous mode [ 3110.328787][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3110.337299][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3110.345739][ T5608] bridge0: port 1(bridge_slave_0) entered blocking state [ 3110.352920][ T5608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3110.360773][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3110.369430][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3110.377656][ T5608] bridge0: port 2(bridge_slave_1) entered blocking state [ 3110.384770][ T5608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3110.402227][ T7509] team0: Port device team_slave_0 added [ 3110.415471][ T7509] team0: Port device team_slave_1 added [ 3110.422219][ T7510] team0: Port device team_slave_0 added [ 3110.432862][ T7510] team0: Port device team_slave_1 added [ 3110.450240][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3110.520244][ T7510] device hsr_slave_0 entered promiscuous mode [ 3110.558248][ T7510] device hsr_slave_1 entered promiscuous mode [ 3110.597878][ T7510] debugfs: Directory 'hsr0' with parent '/' already present! [ 3110.610165][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3110.621772][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3110.634335][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3110.643147][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3110.651540][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3110.660265][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3110.675907][ T7503] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3110.686418][ T7503] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3110.705909][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3110.714363][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3110.722879][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3110.731141][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3110.800177][ T7509] device hsr_slave_0 entered promiscuous mode [ 3110.838287][ T7509] device hsr_slave_1 entered promiscuous mode [ 3110.887858][ T7509] debugfs: Directory 'hsr0' with parent '/' already present! [ 3110.898516][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3110.909425][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3110.916842][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3110.927052][ T7503] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3110.952861][ T7508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3110.980217][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3110.988730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3110.998162][ T7508] 8021q: adding VLAN 0 to HW filter on device team0 [ 3111.011772][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3111.024225][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3111.032789][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3111.039948][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3111.063440][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3111.076938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3111.086163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3111.094593][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 3111.101693][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3111.110055][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3111.119069][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3111.127910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3111.136351][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3111.145479][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3111.161143][ T7510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3111.172890][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3111.181723][ T5608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3111.215904][ T7509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3111.229951][ T7508] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3111.244129][ T7508] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3111.257142][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3111.265954][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3111.274857][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3111.283672][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3111.292941][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3111.369434][ T7510] 8021q: adding VLAN 0 to HW filter on device team0 [ 3111.419841][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3111.438042][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3111.510011][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3111.528982][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3111.544792][T26317] bridge0: port 1(bridge_slave_0) entered blocking state [ 3111.551898][T26317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3111.570569][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3111.583351][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3111.620161][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3111.628990][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3111.641028][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3111.650058][ T5652] bridge0: port 2(bridge_slave_1) entered blocking state [ 3111.657136][ T5652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3111.667709][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3111.675545][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3111.686376][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3111.695933][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3111.708415][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3111.717106][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3111.730748][ T7509] 8021q: adding VLAN 0 to HW filter on device team0 [ 3111.743152][ T7508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3111.754515][ T7440] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3111.775773][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3111.789347][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3111.802586][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3111.814277][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3111.822960][T26317] bridge0: port 1(bridge_slave_0) entered blocking state [ 3111.830011][T26317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3111.839682][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3111.848401][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3111.856723][T26317] bridge0: port 2(bridge_slave_1) entered blocking state [ 3111.863787][T26317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3111.872438][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3111.884669][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3111.893501][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3111.903029][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3111.917260][ T7510] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3111.934703][ T7510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3111.943579][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3111.954909][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3111.963924][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3111.975335][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3111.984864][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3111.997426][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3112.006050][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3112.014759][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3112.041347][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3112.054845][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3112.063868][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3112.072451][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3112.081178][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3112.088648][ T5607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3112.097358][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3112.109779][ T7510] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3112.128551][ T7509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3112.135787][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3112.144061][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:59:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r4, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r10, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r5, 0x8080}, {r6, 0x14a}, {r7, 0x800c}, {r8, 0xcb21159eda11a0c8}, {r9, 0x100}, {0xffffffffffffffff, 0x1004}, {r10, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x2d, 'pids'}]}, 0x6) 07:59:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) fstat(0xffffffffffffffff, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents64(r2, &(0x7f0000000040)=""/70, 0x46) getdents(r2, &(0x7f00000020c0)=""/45, 0x2d) 07:59:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:44 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, 0x0) 07:59:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r6, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x2916, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e6961740002140100f6000270fff8", 0x16}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:59:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 07:59:44 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 07:59:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) [ 3114.807790][ T7594] IPVS: ftp: loaded support on port[0] = 21 [ 3115.043410][ T7594] chnl_net:caif_netlink_parms(): no params data found [ 3115.069205][ T7594] bridge0: port 1(bridge_slave_0) entered blocking state [ 3115.076293][ T7594] bridge0: port 1(bridge_slave_0) entered disabled state [ 3115.083993][ T7594] device bridge_slave_0 entered promiscuous mode [ 3115.158674][ T7594] bridge0: port 2(bridge_slave_1) entered blocking state [ 3115.165817][ T7594] bridge0: port 2(bridge_slave_1) entered disabled state [ 3115.173629][ T7594] device bridge_slave_1 entered promiscuous mode [ 3115.189869][ T7594] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3115.200740][ T7594] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3115.291902][ T7594] team0: Port device team_slave_0 added [ 3115.298945][ T7594] team0: Port device team_slave_1 added [ 3115.350048][ T7594] device hsr_slave_0 entered promiscuous mode [ 3115.398197][ T7594] device hsr_slave_1 entered promiscuous mode [ 3115.457914][ T7594] debugfs: Directory 'hsr0' with parent '/' already present! [ 3115.559924][ T7594] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3115.572530][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3115.580504][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3115.591214][ T7594] 8021q: adding VLAN 0 to HW filter on device team0 [ 3115.668210][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3115.676803][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3115.685742][T26317] bridge0: port 1(bridge_slave_0) entered blocking state [ 3115.692790][T26317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3115.701064][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3115.789326][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3115.798621][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3115.807259][T30141] bridge0: port 2(bridge_slave_1) entered blocking state [ 3115.814343][T30141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3115.822979][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3115.831912][T30141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3115.924937][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3115.933815][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3115.942453][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3115.951657][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3115.960703][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3115.970979][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3115.979690][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3116.056106][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3116.068887][ T7600] IPVS: ftp: loaded support on port[0] = 21 [ 3116.072137][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3116.085099][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3116.182360][ T7594] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3116.221709][ T6711] device bridge_slave_1 left promiscuous mode [ 3116.227954][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3116.268806][ T6711] device bridge_slave_0 left promiscuous mode [ 3116.275024][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3116.328854][ T6711] device bridge_slave_1 left promiscuous mode [ 3116.335053][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3116.368726][ T6711] device bridge_slave_0 left promiscuous mode [ 3116.374952][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3116.429363][ T6711] device bridge_slave_1 left promiscuous mode [ 3116.435748][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3116.498445][ T6711] device bridge_slave_0 left promiscuous mode [ 3116.504598][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3118.367951][ T6711] device hsr_slave_0 left promiscuous mode [ 3118.417981][ T6711] device hsr_slave_1 left promiscuous mode [ 3118.464635][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3118.474786][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3118.484814][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3118.541500][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3118.617381][ T6711] bond0 (unregistering): Released all slaves [ 3118.758134][ T6711] device hsr_slave_0 left promiscuous mode [ 3118.808012][ T6711] device hsr_slave_1 left promiscuous mode [ 3118.874140][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3118.884245][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3118.894158][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3118.951842][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3119.018387][ T6711] bond0 (unregistering): Released all slaves [ 3119.178157][ T6711] device hsr_slave_0 left promiscuous mode [ 3119.237890][ T6711] device hsr_slave_1 left promiscuous mode [ 3119.304083][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3119.315055][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3119.324785][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3119.361794][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3119.438827][ T6711] bond0 (unregistering): Released all slaves [ 3119.527119][ T7600] chnl_net:caif_netlink_parms(): no params data found [ 3119.558372][ T7600] bridge0: port 1(bridge_slave_0) entered blocking state [ 3119.565539][ T7600] bridge0: port 1(bridge_slave_0) entered disabled state [ 3119.573328][ T7600] device bridge_slave_0 entered promiscuous mode [ 3119.580860][ T7600] bridge0: port 2(bridge_slave_1) entered blocking state [ 3119.588026][ T7600] bridge0: port 2(bridge_slave_1) entered disabled state [ 3119.595701][ T7600] device bridge_slave_1 entered promiscuous mode [ 3119.634582][ T7600] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3119.649042][ T7600] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3119.666108][ T7600] team0: Port device team_slave_0 added [ 3119.672916][ T7600] team0: Port device team_slave_1 added [ 3119.879978][ T7600] device hsr_slave_0 entered promiscuous mode [ 3119.918169][ T7600] device hsr_slave_1 entered promiscuous mode [ 3119.967072][ T7600] bridge0: port 2(bridge_slave_1) entered blocking state [ 3119.974298][ T7600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3119.981565][ T7600] bridge0: port 1(bridge_slave_0) entered blocking state [ 3119.988687][ T7600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3120.025697][ T7600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3120.040823][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3120.049676][T30483] bridge0: port 1(bridge_slave_0) entered disabled state [ 3120.060636][T30483] bridge0: port 2(bridge_slave_1) entered disabled state [ 3120.070054][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3120.082287][ T7600] 8021q: adding VLAN 0 to HW filter on device team0 [ 3120.096035][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3120.105331][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3120.112396][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3120.131859][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3120.142395][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3120.149612][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3120.170611][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3120.181615][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3120.190740][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3120.202108][ T7600] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3120.213629][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3120.223838][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3120.232188][T26317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3120.247159][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3120.254868][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3120.265915][ T7600] 8021q: adding VLAN 0 to HW filter on device batadv0 07:59:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 07:59:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 07:59:51 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 07:59:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {0xffffffffffffffff, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 07:59:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {0xffffffffffffffff, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {0xffffffffffffffff, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:59:53 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 07:59:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 07:59:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) [ 3123.518983][ T7669] IPVS: ftp: loaded support on port[0] = 21 [ 3123.770696][ T7669] chnl_net:caif_netlink_parms(): no params data found [ 3123.799254][ T7669] bridge0: port 1(bridge_slave_0) entered blocking state [ 3123.806341][ T7669] bridge0: port 1(bridge_slave_0) entered disabled state [ 3123.814140][ T7669] device bridge_slave_0 entered promiscuous mode [ 3123.867318][ T7669] bridge0: port 2(bridge_slave_1) entered blocking state [ 3123.874639][ T7669] bridge0: port 2(bridge_slave_1) entered disabled state [ 3123.882529][ T7669] device bridge_slave_1 entered promiscuous mode [ 3123.897420][ T6711] device bridge_slave_1 left promiscuous mode [ 3123.904884][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3123.948890][ T6711] device bridge_slave_0 left promiscuous mode [ 3123.955178][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3124.029435][ T6711] device bridge_slave_1 left promiscuous mode [ 3124.035690][ T6711] bridge0: port 2(bridge_slave_1) entered disabled state [ 3124.088696][ T6711] device bridge_slave_0 left promiscuous mode [ 3124.095013][ T6711] bridge0: port 1(bridge_slave_0) entered disabled state [ 3125.518097][ T6711] device hsr_slave_0 left promiscuous mode [ 3125.567843][ T6711] device hsr_slave_1 left promiscuous mode [ 3125.613070][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3125.623974][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3125.633834][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3125.691423][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3125.757807][ T6711] bond0 (unregistering): Released all slaves [ 3125.888141][ T6711] device hsr_slave_0 left promiscuous mode [ 3125.947976][ T6711] device hsr_slave_1 left promiscuous mode [ 3126.013899][ T6711] team0 (unregistering): Port device team_slave_1 removed [ 3126.024477][ T6711] team0 (unregistering): Port device team_slave_0 removed [ 3126.035148][ T6711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3126.093530][ T6711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3126.168787][ T6711] bond0 (unregistering): Released all slaves [ 3126.271803][ T7669] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3126.282687][ T7669] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3126.298636][ T7682] IPVS: ftp: loaded support on port[0] = 21 [ 3126.303606][ T7683] IPVS: ftp: loaded support on port[0] = 21 [ 3126.314836][ T7684] IPVS: ftp: loaded support on port[0] = 21 [ 3126.318929][ T7669] team0: Port device team_slave_0 added [ 3126.340472][ T7669] team0: Port device team_slave_1 added [ 3126.450439][ T7669] device hsr_slave_0 entered promiscuous mode [ 3126.488219][ T7669] device hsr_slave_1 entered promiscuous mode [ 3126.637129][ T7683] chnl_net:caif_netlink_parms(): no params data found [ 3126.729613][ T7682] chnl_net:caif_netlink_parms(): no params data found [ 3126.738413][ T7684] chnl_net:caif_netlink_parms(): no params data found [ 3126.798983][ T7683] bridge0: port 1(bridge_slave_0) entered blocking state [ 3126.806057][ T7683] bridge0: port 1(bridge_slave_0) entered disabled state [ 3126.814260][ T7683] device bridge_slave_0 entered promiscuous mode [ 3126.826281][ T7684] bridge0: port 1(bridge_slave_0) entered blocking state [ 3126.834673][ T7684] bridge0: port 1(bridge_slave_0) entered disabled state [ 3126.842851][ T7684] device bridge_slave_0 entered promiscuous mode [ 3126.851281][ T7682] bridge0: port 1(bridge_slave_0) entered blocking state [ 3126.859581][ T7682] bridge0: port 1(bridge_slave_0) entered disabled state [ 3126.867229][ T7682] device bridge_slave_0 entered promiscuous mode [ 3126.877087][ T7682] bridge0: port 2(bridge_slave_1) entered blocking state [ 3126.885401][ T7682] bridge0: port 2(bridge_slave_1) entered disabled state [ 3126.895404][ T7682] device bridge_slave_1 entered promiscuous mode [ 3126.915309][ T7683] bridge0: port 2(bridge_slave_1) entered blocking state [ 3126.928950][ T7683] bridge0: port 2(bridge_slave_1) entered disabled state [ 3126.936750][ T7683] device bridge_slave_1 entered promiscuous mode [ 3126.947528][ T7684] bridge0: port 2(bridge_slave_1) entered blocking state [ 3126.955953][ T7684] bridge0: port 2(bridge_slave_1) entered disabled state [ 3126.966315][ T7684] device bridge_slave_1 entered promiscuous mode [ 3126.976316][ T7682] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3127.001523][ T7683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3127.017370][ T7682] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3127.046065][ T7683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3127.064142][ T7684] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3127.077317][ T7682] team0: Port device team_slave_0 added [ 3127.090220][ T7683] team0: Port device team_slave_0 added [ 3127.097059][ T7683] team0: Port device team_slave_1 added [ 3127.107382][ T7684] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3127.118083][ T7682] team0: Port device team_slave_1 added [ 3127.127704][ T7669] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3127.220378][ T7683] device hsr_slave_0 entered promiscuous mode [ 3127.260740][ T7683] device hsr_slave_1 entered promiscuous mode [ 3127.298054][ T7683] debugfs: Directory 'hsr0' with parent '/' already present! [ 3127.308650][ T7684] team0: Port device team_slave_0 added [ 3127.360490][ T7682] device hsr_slave_0 entered promiscuous mode [ 3127.398368][ T7682] device hsr_slave_1 entered promiscuous mode [ 3127.437927][ T7682] debugfs: Directory 'hsr0' with parent '/' already present! [ 3127.450120][ T7669] 8021q: adding VLAN 0 to HW filter on device team0 [ 3127.468074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3127.475720][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3127.486223][ T7684] team0: Port device team_slave_1 added [ 3127.498555][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3127.507006][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3127.518486][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3127.525734][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3127.570344][ T7684] device hsr_slave_0 entered promiscuous mode [ 3127.610780][ T7684] device hsr_slave_1 entered promiscuous mode [ 3127.647951][ T7684] debugfs: Directory 'hsr0' with parent '/' already present! [ 3127.658592][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3127.682454][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3127.692084][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3127.700884][ T5652] bridge0: port 2(bridge_slave_1) entered blocking state [ 3127.708160][ T5652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3127.737560][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3127.746550][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3127.767162][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3127.780059][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3127.789331][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3127.798322][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3127.819660][ T7669] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3127.833711][ T7669] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3127.850663][ T7683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3127.869060][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3127.883707][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3127.892248][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3127.901156][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3127.909609][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3127.918078][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3127.940899][ T7669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3127.955545][ T7683] 8021q: adding VLAN 0 to HW filter on device team0 [ 3127.974495][ T7684] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3127.984995][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3127.993370][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3128.003814][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3128.011743][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3128.025595][ T7682] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3128.036720][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3128.046027][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3128.054618][ T5652] bridge0: port 1(bridge_slave_0) entered blocking state [ 3128.061943][ T5652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3128.070532][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3128.085607][ T7684] 8021q: adding VLAN 0 to HW filter on device team0 [ 3128.098535][ T7682] 8021q: adding VLAN 0 to HW filter on device team0 [ 3128.106252][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3128.115800][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3128.128317][ T5609] bridge0: port 2(bridge_slave_1) entered blocking state [ 3128.135434][ T5609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3128.146403][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3128.154705][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3128.162725][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3128.171740][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3128.179743][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3128.203699][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3128.213319][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3128.222151][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3128.231117][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3128.262002][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3128.276396][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3128.283490][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3128.291608][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3128.300325][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3128.309214][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3128.317846][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3128.326249][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3128.333305][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3128.341133][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3128.349669][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3128.358333][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3128.367201][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3128.375925][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3128.384443][T30483] bridge0: port 1(bridge_slave_0) entered blocking state [ 3128.391738][T30483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3128.403491][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3128.412185][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3128.424177][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3128.435246][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3128.445018][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3128.475907][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3128.511202][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3128.523371][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3128.537397][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3128.546914][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3128.556456][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3128.566601][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3128.578011][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3128.586665][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 3128.593876][ T7916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3128.606625][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3128.615774][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3128.627340][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3128.636357][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3128.645272][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3128.653650][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3128.668934][ T7684] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3128.679976][ T7684] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3128.703690][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3128.712470][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3128.721717][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3128.732012][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3128.741150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3128.750609][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3128.759749][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3128.769766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3128.778231][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3128.786590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3128.796158][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3128.814991][ T7682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3128.824230][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3128.833326][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3128.844873][ T7684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3128.867166][ T7683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3128.875483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3128.883862][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3128.894577][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3128.902914][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3128.913617][ T7682] 8021q: adding VLAN 0 to HW filter on device batadv0 08:00:00 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 08:00:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 08:00:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 08:00:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 08:00:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r4, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r10, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r5, 0x8080}, {r6, 0x14a}, {r7, 0x800c}, {r8, 0xcb21159eda11a0c8}, {r9, 0x100}, {0xffffffffffffffff, 0x1004}, {r10, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 08:00:01 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:00:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r4, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r10, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r5, 0x8080}, {r6, 0x14a}, {r7, 0x800c}, {r8, 0xcb21159eda11a0c8}, {r9, 0x100}, {0xffffffffffffffff, 0x1004}, {r10, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 08:00:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff00000002f2000000030005000000000002004e20ded5b29c0000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5ded1f6ecb3d3654daff92105f6cb9be0b6b530ce576d07b940a5b7d67140393890b8fc08803e4b5fc2a44da4fa31288a64e950a959f4b857cf0fa0f4515e5aacf64c63e23822a493d878dac5c800800000d4414b622a5446fed34559b7a9635df6c786cbd0a2705cf98318da11f787bc3c290caa2c3f22be876f8838ea59e3a87f10159efd4bfb825f8c412ffafdb4f4a6a685b020a9e96fc4680740744c55712ce2063af46c6f9dfe41944e2a0c248b43d5c4720c1d78e831c15e786fdaf2ae40f81bfbab756927b0032c4b92b2858be830c16df808e815476cb4ce617d37df1b6d66c83313b4a15b6330e124aa5aa6592b3fc6520c311f5146bc3d0befe0ace6695ea852f6c1bc72d6364aa68487056acc6605ae3becef54806187d3b67547134de0f4d1145752985e469d2069b492b48a45cd436bdfac8e72070fb896025138a9307ff32700065d7a33bac39bbc0032f7a4869e156aed176d70c9e55b292cc857e823d6ca994420c7f1c333b024"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r11 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r11, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x8080}, {r7, 0x14a}, {r8, 0x800c}, {r9, 0xcb21159eda11a0c8}, {r10, 0x100}, {0xffffffffffffffff, 0x1004}, {r11, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) [ 3131.608988][ T5180] device bridge_slave_1 left promiscuous mode [ 3131.617363][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3131.671248][ T5180] device bridge_slave_0 left promiscuous mode [ 3131.686140][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3132.948121][ T5180] device hsr_slave_0 left promiscuous mode [ 3132.997939][ T5180] device hsr_slave_1 left promiscuous mode [ 3133.054295][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3133.066161][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3133.076593][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3133.131963][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3133.219866][ T5180] bond0 (unregistering): Released all slaves [ 3133.394238][ T7764] IPVS: ftp: loaded support on port[0] = 21 [ 3133.445892][ T7764] chnl_net:caif_netlink_parms(): no params data found [ 3133.473625][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 3133.480928][ T7764] bridge0: port 1(bridge_slave_0) entered disabled state [ 3133.488994][ T7764] device bridge_slave_0 entered promiscuous mode [ 3133.496496][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 3133.503607][ T7764] bridge0: port 2(bridge_slave_1) entered disabled state [ 3133.511688][ T7764] device bridge_slave_1 entered promiscuous mode [ 3133.562124][ T7764] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3133.573762][ T7764] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3133.595678][ T7764] team0: Port device team_slave_0 added [ 3133.604995][ T7764] team0: Port device team_slave_1 added [ 3133.662361][ T7764] device hsr_slave_0 entered promiscuous mode [ 3133.728193][ T7764] device hsr_slave_1 entered promiscuous mode [ 3133.806867][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 3133.814266][ T7764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3133.821560][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 3133.828704][ T7764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3133.912299][ T7769] IPVS: ftp: loaded support on port[0] = 21 [ 3133.924675][ T7764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3133.950704][ T7770] IPVS: ftp: loaded support on port[0] = 21 [ 3133.973707][ T7764] 8021q: adding VLAN 0 to HW filter on device team0 [ 3133.981070][ T7771] IPVS: ftp: loaded support on port[0] = 21 [ 3133.994538][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3134.003629][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 3134.012073][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 3134.070333][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3134.081862][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 3134.089054][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3134.097074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3134.105705][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 3134.112864][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3134.193078][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3134.201898][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3134.219089][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3134.243617][ T7769] chnl_net:caif_netlink_parms(): no params data found [ 3134.263777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3134.272791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3134.286787][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3134.322657][ T7769] bridge0: port 1(bridge_slave_0) entered blocking state [ 3134.330317][ T7769] bridge0: port 1(bridge_slave_0) entered disabled state [ 3134.339300][ T7769] device bridge_slave_0 entered promiscuous mode [ 3134.352248][ T7771] chnl_net:caif_netlink_parms(): no params data found [ 3134.361803][ T7769] bridge0: port 2(bridge_slave_1) entered blocking state [ 3134.372065][ T7769] bridge0: port 2(bridge_slave_1) entered disabled state [ 3134.380772][ T7769] device bridge_slave_1 entered promiscuous mode [ 3134.448262][ T7770] chnl_net:caif_netlink_parms(): no params data found [ 3134.461864][ T7769] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3134.474080][ T7769] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3134.485590][ T7771] bridge0: port 1(bridge_slave_0) entered blocking state [ 3134.493109][ T7771] bridge0: port 1(bridge_slave_0) entered disabled state [ 3134.501064][ T7771] device bridge_slave_0 entered promiscuous mode [ 3134.525788][ T7771] bridge0: port 2(bridge_slave_1) entered blocking state [ 3134.534167][ T7771] bridge0: port 2(bridge_slave_1) entered disabled state [ 3134.541993][ T7771] device bridge_slave_1 entered promiscuous mode [ 3134.558997][ T7769] team0: Port device team_slave_0 added [ 3134.576571][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3134.586541][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3134.599251][ T7769] team0: Port device team_slave_1 added [ 3134.605769][ T7770] bridge0: port 1(bridge_slave_0) entered blocking state [ 3134.613251][ T7770] bridge0: port 1(bridge_slave_0) entered disabled state [ 3134.621328][ T7770] device bridge_slave_0 entered promiscuous mode [ 3134.629373][ T7770] bridge0: port 2(bridge_slave_1) entered blocking state [ 3134.636408][ T7770] bridge0: port 2(bridge_slave_1) entered disabled state [ 3134.644980][ T7770] device bridge_slave_1 entered promiscuous mode [ 3134.658361][ T7771] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3134.673961][ T7771] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3134.703593][ T7770] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3134.722180][ T7771] team0: Port device team_slave_0 added [ 3134.729256][ T7770] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3134.740298][ T7764] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3134.790086][ T7769] device hsr_slave_0 entered promiscuous mode [ 3134.828631][ T7769] device hsr_slave_1 entered promiscuous mode [ 3134.868086][ T7769] debugfs: Directory 'hsr0' with parent '/' already present! [ 3134.880965][ T7771] team0: Port device team_slave_1 added [ 3135.049238][ T7770] team0: Port device team_slave_0 added [ 3135.056211][ T7770] team0: Port device team_slave_1 added [ 3135.100164][ T7771] device hsr_slave_0 entered promiscuous mode [ 3135.158215][ T7771] device hsr_slave_1 entered promiscuous mode [ 3135.198081][ T7771] debugfs: Directory 'hsr0' with parent '/' already present! [ 3135.333940][ T7770] device hsr_slave_0 entered promiscuous mode [ 3135.398489][ T7770] device hsr_slave_1 entered promiscuous mode [ 3135.447895][ T7770] debugfs: Directory 'hsr0' with parent '/' already present! [ 3135.666281][ T7769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3135.779658][ T7769] 8021q: adding VLAN 0 to HW filter on device team0 [ 3135.786886][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3135.794993][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3135.806250][ T7771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3135.822869][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3135.832731][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3135.841809][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 3135.848862][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3135.857344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3135.952508][ T7770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3135.960039][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3135.969567][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3135.979034][ T5652] bridge0: port 2(bridge_slave_1) entered blocking state [ 3135.986251][ T5652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3135.994181][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3136.003387][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3136.011259][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3136.019117][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3136.031149][ T7771] 8021q: adding VLAN 0 to HW filter on device team0 [ 3136.124297][ T7770] 8021q: adding VLAN 0 to HW filter on device team0 [ 3136.132743][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3136.141399][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3136.149578][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3136.158910][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3136.167562][ T9029] bridge0: port 1(bridge_slave_0) entered blocking state [ 3136.174628][ T9029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3136.182969][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3136.192007][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3136.201205][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3136.209540][ T9029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3136.302337][ T7769] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3136.313240][ T7769] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3136.326104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3136.340897][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 08:00:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r5, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:07 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:00:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) [ 3136.352463][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3136.379817][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3136.394070][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3136.403080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3136.416574][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 3136.423667][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3136.437313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3136.446089][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3136.709390][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3136.721676][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3136.731241][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3136.740045][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 3136.747458][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3136.758768][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3136.767575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3136.776435][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 3136.783978][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3136.798195][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3136.807579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3136.821824][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:00:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3136.946066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3136.954443][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3136.964354][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3136.973217][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3136.982846][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3136.991802][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 08:00:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) [ 3137.274262][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3137.295602][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3137.311994][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3137.330131][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3137.347615][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3137.365002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 08:00:08 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 3137.384081][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3137.408557][ T7771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3137.423332][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3137.487061][ T7769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3137.564292][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3137.588569][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3137.611723][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3137.640139][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3137.661789][ T5180] device bridge_slave_1 left promiscuous mode [ 3137.670508][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3137.728480][ T5180] device bridge_slave_0 left promiscuous mode [ 3137.734707][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3137.789125][ T5180] device bridge_slave_1 left promiscuous mode [ 3137.795406][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3137.868872][ T5180] device bridge_slave_0 left promiscuous mode [ 3137.875083][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3137.949398][ T5180] device bridge_slave_1 left promiscuous mode [ 3137.958315][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3138.014612][ T5180] device bridge_slave_0 left promiscuous mode [ 3138.037474][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state 08:00:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) [ 3140.468131][ T5180] device hsr_slave_0 left promiscuous mode [ 3140.537974][ T5180] device hsr_slave_1 left promiscuous mode [ 3140.604513][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3140.614855][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3140.624974][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3140.681771][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3140.748024][ T5180] bond0 (unregistering): Released all slaves [ 3140.908205][ T5180] device hsr_slave_0 left promiscuous mode [ 3140.967891][ T5180] device hsr_slave_1 left promiscuous mode [ 3141.035285][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3141.045674][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3141.055811][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3141.081388][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3141.160308][ T5180] bond0 (unregistering): Released all slaves [ 3141.309547][ T5180] device hsr_slave_0 left promiscuous mode [ 3141.348016][ T5180] device hsr_slave_1 left promiscuous mode [ 3141.403916][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3141.414783][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3141.425745][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3141.461352][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3141.549108][ T5180] bond0 (unregistering): Released all slaves [ 3141.655775][ T7771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3141.678291][ T7770] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 3141.694880][ T7770] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3141.707326][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3141.715297][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3141.722758][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3141.731169][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3141.739972][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3141.748364][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3141.756587][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3141.783109][ T7816] IPVS: ftp: loaded support on port[0] = 21 [ 3141.796965][ T7770] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3141.810653][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3141.819013][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3141.925909][ T7816] chnl_net:caif_netlink_parms(): no params data found [ 3142.058438][ T7816] bridge0: port 1(bridge_slave_0) entered blocking state [ 3142.065688][ T7816] bridge0: port 1(bridge_slave_0) entered disabled state [ 3142.077086][ T7816] device bridge_slave_0 entered promiscuous mode [ 3142.172668][ T7816] bridge0: port 2(bridge_slave_1) entered blocking state [ 3142.274340][ T7816] bridge0: port 2(bridge_slave_1) entered disabled state [ 3142.342518][ T7816] device bridge_slave_1 entered promiscuous mode [ 3142.393391][ T7816] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3142.404764][ T7816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3142.425113][ T7816] team0: Port device team_slave_0 added [ 3142.432676][ T7816] team0: Port device team_slave_1 added [ 3142.506819][ T7816] device hsr_slave_0 entered promiscuous mode [ 3142.559691][ T7816] device hsr_slave_1 entered promiscuous mode [ 3142.607806][ T7816] debugfs: Directory 'hsr0' with parent '/' already present! [ 3142.630663][ T7816] bridge0: port 2(bridge_slave_1) entered blocking state [ 3142.637789][ T7816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3142.645124][ T7816] bridge0: port 1(bridge_slave_0) entered blocking state [ 3142.652168][ T7816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3142.705117][ T7816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3142.726139][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3142.734996][ T5652] bridge0: port 1(bridge_slave_0) entered disabled state [ 3142.746262][ T5652] bridge0: port 2(bridge_slave_1) entered disabled state [ 3142.761822][ T7816] 8021q: adding VLAN 0 to HW filter on device team0 [ 3142.775926][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3142.785053][ T5652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3142.796777][ T5652] bridge0: port 1(bridge_slave_0) entered blocking state [ 3142.803996][ T5652] bridge0: port 1(bridge_slave_0) entered forwarding state 08:00:13 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 3142.821448][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3142.830741][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3142.839534][T30483] bridge0: port 2(bridge_slave_1) entered blocking state [ 3142.846658][T30483] bridge0: port 2(bridge_slave_1) entered forwarding state 08:00:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3142.874592][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3142.897677][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3142.928696][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3142.939782][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3142.955219][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3142.970594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3142.980259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3142.989033][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3142.997550][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3143.006360][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3143.211768][ T7816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3143.228704][T30483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3143.266595][ T7816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3143.310204][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3143.321815][ T5609] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 08:00:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r4, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x1, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r10 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r10, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r5, 0x8080}, {r6, 0x14a}, {r7, 0x800c}, {r8, 0xcb21159eda11a0c8}, {r9, 0x100}, {0xffffffffffffffff, 0x1004}, {r10, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 08:00:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 08:00:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:15 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 08:00:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r6, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r8, &(0x7f00000024c0)) r9 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22, 0x0, 0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r12, &(0x7f00000024c0)) poll(&(0x7f0000000340)=[{r7, 0x8080}, {r8, 0x14a}, {r9, 0x800c}, {r10, 0xcb21159eda11a0c8}, {r11, 0x100}, {0xffffffffffffffff, 0x1004}, {r12, 0x3af29aa8777e2979}], 0x7, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:00:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(0x0, 0x8c800) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 08:00:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getresgid(0x0, &(0x7f0000000640), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0xfffe, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4000000000002a5, 0x4008000) 08:00:17 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x200, 0x101, 0x0, 0xffffffffffeffffc, 0x0, 0x0, 0x3], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 08:00:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f0000000380)=ANY=[@ANYBLOB="80f6bc608be45674d85d2dcbf84c05132a9ec4a2fe1a441b711710820300ba62aa93b2fbdd5bc0117a287fdf05b58764c1038e5e37668939de3ea9c635e0a29a50faf6c56bdcb1961115f691f5ca5e4e97b78f9a8fb32cc354b9f0d183d6536abf9d65f920866c72372097037bbeac2dc81d"], 0x10}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x30) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r6, &(0x7f00000024c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000002c0)={0x0, 0x22}) fstat(0xffffffffffffffff, &(0x7f00000024c0)) r7 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netfilter\x00') fstat(r7, &(0x7f00000024c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 3146.463570][ T7883] IPVS: ftp: loaded support on port[0] = 21 [ 3146.871656][ T7893] IPVS: ftp: loaded support on port[0] = 21 [ 3147.247217][ T7893] chnl_net:caif_netlink_parms(): no params data found [ 3147.263284][ T7883] chnl_net:caif_netlink_parms(): no params data found [ 3147.398799][ T7893] bridge0: port 1(bridge_slave_0) entered blocking state [ 3147.405919][ T7893] bridge0: port 1(bridge_slave_0) entered disabled state [ 3147.413712][ T7893] device bridge_slave_0 entered promiscuous mode [ 3147.421323][ T7883] bridge0: port 1(bridge_slave_0) entered blocking state [ 3147.428732][ T7883] bridge0: port 1(bridge_slave_0) entered disabled state [ 3147.436359][ T7883] device bridge_slave_0 entered promiscuous mode [ 3147.548883][ T7893] bridge0: port 2(bridge_slave_1) entered blocking state [ 3147.555998][ T7893] bridge0: port 2(bridge_slave_1) entered disabled state [ 3147.564224][ T7893] device bridge_slave_1 entered promiscuous mode [ 3147.571328][ T7883] bridge0: port 2(bridge_slave_1) entered blocking state [ 3147.578495][ T7883] bridge0: port 2(bridge_slave_1) entered disabled state [ 3147.586446][ T7883] device bridge_slave_1 entered promiscuous mode [ 3147.607739][ T7893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3147.619122][ T7893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3147.736251][ T7883] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3147.746449][ T7893] team0: Port device team_slave_0 added [ 3147.753790][ T7893] team0: Port device team_slave_1 added [ 3147.761423][ T7883] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3147.782215][ T7883] team0: Port device team_slave_0 added [ 3147.887237][ T7883] team0: Port device team_slave_1 added [ 3147.939679][ T7883] device hsr_slave_0 entered promiscuous mode [ 3147.978175][ T7883] device hsr_slave_1 entered promiscuous mode [ 3148.027862][ T7883] debugfs: Directory 'hsr0' with parent '/' already present! [ 3148.080176][ T7893] device hsr_slave_0 entered promiscuous mode [ 3148.128228][ T7893] device hsr_slave_1 entered promiscuous mode [ 3148.167921][ T7893] debugfs: Directory 'hsr0' with parent '/' already present! [ 3148.176759][ T5180] device bridge_slave_1 left promiscuous mode [ 3148.183218][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3148.208568][ T5180] device bridge_slave_0 left promiscuous mode [ 3148.214808][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3148.258992][ T5180] device bridge_slave_1 left promiscuous mode [ 3148.265200][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3148.318431][ T5180] device bridge_slave_0 left promiscuous mode [ 3148.324679][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3148.389062][ T5180] device bridge_slave_1 left promiscuous mode [ 3148.395292][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3148.458580][ T5180] device bridge_slave_0 left promiscuous mode [ 3148.464753][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3148.508992][ T5180] device bridge_slave_1 left promiscuous mode [ 3148.515139][ T5180] bridge0: port 2(bridge_slave_1) entered disabled state [ 3148.568457][ T5180] device bridge_slave_0 left promiscuous mode [ 3148.574670][ T5180] bridge0: port 1(bridge_slave_0) entered disabled state [ 3151.098099][ T5180] device hsr_slave_0 left promiscuous mode [ 3151.138041][ T5180] device hsr_slave_1 left promiscuous mode [ 3151.193950][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3151.204759][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3151.214903][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3151.251254][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3151.328753][ T5180] bond0 (unregistering): Released all slaves [ 3151.468298][ T5180] device hsr_slave_0 left promiscuous mode [ 3151.517873][ T5180] device hsr_slave_1 left promiscuous mode [ 3151.604265][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3151.614426][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3151.624449][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3151.661258][ T5180] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3151.738659][ T5180] bond0 (unregistering): Released all slaves [ 3151.918344][ T5180] device hsr_slave_0 left promiscuous mode [ 3151.967945][ T5180] device hsr_slave_1 left promiscuous mode [ 3152.044292][ T5180] team0 (unregistering): Port device team_slave_1 removed [ 3152.054586][ T5180] team0 (unregistering): Port device team_slave_0 removed [ 3152.065096][ T5180] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3152.102016][ T5180] bond0 (unregistering): (slave bond_slave[ 3152.108968][ T5180] ================================================================== [ 3152.108975][ T5180] BUG: KCSAN: data-race in wq_watchdog_reset_touched / wq_watchdog_touch [ 3152.108977][ T5180] [ 3152.108982][ T5180] write to 0xffff88812bf172c8 of 8 bytes by interrupt on cpu 0: [ 3152.108986][ T5180] wq_watchdog_reset_touched+0x8c/0xe0 [ 3152.108990][ T5180] wq_watchdog_timer_fn+0x270/0x2b0 [ 3152.108993][ T5180] call_timer_fn+0x5f/0x2f0 [ 3152.108996][ T5180] run_timer_softirq+0xc7a/0xcd0 [ 3152.108999][ T5180] __do_softirq+0x115/0x33f [ 3152.109002][ T5180] irq_exit+0xbb/0xe0 [ 3152.109006][ T5180] smp_apic_timer_interrupt+0xe6/0x280 [ 3152.109009][ T5180] apic_timer_interrupt+0xf/0x20 [ 3152.109012][ T5180] native_safe_halt+0xe/0x10 [ 3152.109015][ T5180] arch_cpu_idle+0xa/0x10 [ 3152.109018][ T5180] default_idle_call+0x1e/0x40 [ 3152.109021][ T5180] do_idle+0x1af/0x280 [ 3152.109024][ T5180] cpu_startup_entry+0x1b/0x20 [ 3152.109027][ T5180] rest_init+0xec/0xf6 [ 3152.109031][ T5180] arch_call_rest_init+0x17/0x37 [ 3152.109034][ T5180] start_kernel+0x838/0x85e [ 3152.109037][ T5180] x86_64_start_reservations+0x29/0x2b [ 3152.109041][ T5180] x86_64_start_kernel+0x72/0x76 [ 3152.109044][ T5180] secondary_startup_64+0xa4/0xb0 [ 3152.109046][ T5180] [ 3152.109052][ T5180] write to 0xffff88812bf172c8 of 8 bytes by task 5180 on cpu 1: [ 3152.109055][ T5180] wq_watchdog_touch+0x61/0xae [ 3152.109059][ T5180] touch_softlockup_watchdog+0x2a/0x40 [ 3152.109062][ T5180] wait_for_xmitr+0x6f/0x1b0 [ 3152.109065][ T5180] serial8250_console_putchar+0x28/0x50 [ 3152.109069][ T5180] uart_console_write+0x9b/0xd0 [ 3152.109072][ T5180] serial8250_console_write+0x3a0/0x500 [ 3152.109076][ T5180] univ8250_console_write+0x47/0x60 [ 3152.109079][ T5180] console_unlock+0x935/0xb80 [ 3152.109082][ T5180] vprintk_emit+0x38f/0x4e0 [ 3152.109085][ T5180] vprintk_default+0x31/0x50 [ 3152.109088][ T5180] vprintk_func+0x85/0x140 [ 3152.109091][ T5180] printk+0x69/0x91 [ 3152.109094][ T5180] __netdev_printk+0x19f/0x1d1 [ 3152.109097][ T5180] netdev_info+0x90/0xb3 [ 3152.109101][ T5180] __bond_release_one+0x312/0x3d0 [ 3152.109104][ T5180] bond_netdev_event+0x4da/0x510 [ 3152.109107][ T5180] notifier_call_chain+0xd7/0x160 [ 3152.109111][ T5180] raw_notifier_call_chain+0x37/0x50 [ 3152.109115][ T5180] call_netdevice_notifiers_info+0x48/0xc0 [ 3152.109118][ T5180] rollback_registered_many+0x723/0xa00 [ 3152.109122][ T5180] unregister_netdevice_many+0x62/0x240 [ 3152.109126][ T5180] default_device_exit_batch+0x234/0x270 [ 3152.109129][ T5180] ops_exit_list.isra.0+0xa2/0xc0 [ 3152.109132][ T5180] cleanup_net+0x405/0x6b0 [ 3152.109135][ T5180] process_one_work+0x3d4/0x890 [ 3152.109138][ T5180] worker_thread+0xa0/0x800 [ 3152.109141][ T5180] kthread+0x1d4/0x200 [ 3152.109144][ T5180] ret_from_fork+0x1f/0x30 [ 3152.109146][ T5180] [ 3152.109150][ T5180] Reported by Kernel Concurrency Sanitizer on: [ 3152.109155][ T5180] CPU: 1 PID: 5180 Comm: kworker/u4:4 Not tainted 5.4.0-syzkaller #0 [ 3152.109162][ T5180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3152.109165][ T5180] Workqueue: netns cleanup_net [ 3152.109173][ T5180] ================================================================== [ 3152.109177][ T5180] Kernel panic - not syncing: panic_on_warn set ... [ 3152.109182][ T5180] CPU: 1 PID: 5180 Comm: kworker/u4:4 Not tainted 5.4.0-syzkaller #0 [ 3152.109189][ T5180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3152.109192][ T5180] Workqueue: netns cleanup_net [ 3152.109196][ T5180] Call Trace: [ 3152.109199][ T5180] dump_stack+0x11d/0x181 [ 3152.109202][ T5180] panic+0x210/0x640 [ 3152.109205][ T5180] ? vprintk_func+0x8d/0x140 [ 3152.109208][ T5180] kcsan_report.cold+0xc/0xd [ 3152.109212][ T5180] kcsan_setup_watchpoint+0x3fe/0x460 [ 3152.109215][ T5180] __tsan_unaligned_write8+0xc4/0x100 [ 3152.109218][ T5180] wq_watchdog_touch+0x61/0xae [ 3152.109222][ T5180] touch_softlockup_watchdog+0x2a/0x40 [ 3152.109225][ T5180] wait_for_xmitr+0x6f/0x1b0 [ 3152.109229][ T5180] serial8250_console_putchar+0x28/0x50 [ 3152.109232][ T5180] uart_console_write+0x9b/0xd0 [ 3152.109235][ T5180] ? wait_for_xmitr+0x1b0/0x1b0 [ 3152.109239][ T5180] serial8250_console_write+0x3a0/0x500 [ 3152.109242][ T5180] univ8250_console_write+0x47/0x60 [ 3152.109246][ T5180] ? univ8250_console_setup+0x120/0x120 [ 3152.109249][ T5180] console_unlock+0x935/0xb80 [ 3152.109252][ T5180] vprintk_emit+0x38f/0x4e0 [ 3152.109255][ T5180] vprintk_default+0x31/0x50 [ 3152.109258][ T5180] vprintk_func+0x85/0x140 [ 3152.109261][ T5180] printk+0x69/0x91 [ 3152.109265][ T5180] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3152.109268][ T5180] __netdev_printk+0x19f/0x1d1 [ 3152.109271][ T5180] ? finish_wait+0x80/0x80 [ 3152.109274][ T5180] netdev_info+0x90/0xb3 [ 3152.109278][ T5180] __bond_release_one+0x312/0x3d0 [ 3152.109281][ T5180] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 3152.109286][ T5180] ? cfg80211_netdev_notifier_call+0xe2/0xbc7 [ 3152.109290][ T5180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3152.109294][ T5180] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3152.109297][ T5180] ? find_next_bit+0xcb/0xe0 [ 3152.109301][ T5180] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 3152.109305][ T5180] bond_netdev_event+0x4da/0x510 [ 3152.109308][ T5180] notifier_call_chain+0xd7/0x160 [ 3152.109312][ T5180] raw_notifier_call_chain+0x37/0x50 [ 3152.109316][ T5180] call_netdevice_notifiers_info+0x48/0xc0 [ 3152.109319][ T5180] ? veth_disable_xdp+0x530/0x530 [ 3152.109323][ T5180] rollback_registered_many+0x723/0xa00 [ 3152.109326][ T5180] ? __write_once_size+0x41/0xe0 [ 3152.109329][ T5180] unregister_netdevice_many+0x62/0x240 [ 3152.109333][ T5180] default_device_exit_batch+0x234/0x270 [ 3152.109336][ T5180] ? do_wait_intr_irq+0xb0/0xb0 [ 3152.109340][ T5180] ? unregister_netdevice_many+0x240/0x240 [ 3152.109344][ T5180] ? dev_change_net_namespace+0x710/0x710 [ 3152.109347][ T5180] ops_exit_list.isra.0+0xa2/0xc0 [ 3152.109350][ T5180] cleanup_net+0x405/0x6b0 [ 3152.109354][ T5180] process_one_work+0x3d4/0x890 [ 3152.109357][ T5180] worker_thread+0xa0/0x800 [ 3152.109359][ T5180] kthread+0x1d4/0x200 [ 3152.109363][ T5180] ? rescuer_thread+0x6a0/0x6a0 [ 3152.109366][ T5180] ? kthread_stop+0x2d0/0x2d0 [ 3152.109369][ T5180] ret_from_fork+0x1f/0x30 [ 3152.110741][ T5180] Kernel Offset: disabled