7f0000000040)=[{&(0x7f0000000240)}], 0x1}, 0x0) 12:19:18 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 12:19:18 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:18 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:18 executing program 3: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) ioctl$int_in(r2, 0x5421, &(0x7f0000000140)=0x6) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf1, 0x21fc}, 0x14) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 12:19:19 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:19 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) close(r0) 12:19:19 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) [ 1393.592596][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1393.598449][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:19:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) [ 1394.647695][T14917] IPVS: ftp: loaded support on port[0] = 21 [ 1394.760372][T14917] chnl_net:caif_netlink_parms(): no params data found [ 1394.846039][T14917] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.853557][T14917] bridge0: port 1(bridge_slave_0) entered disabled state [ 1394.861136][T14917] device bridge_slave_0 entered promiscuous mode [ 1394.869055][T14917] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.876471][T14917] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.884399][T14917] device bridge_slave_1 entered promiscuous mode [ 1394.904109][T14917] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1394.914679][T14917] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1394.937179][T14917] team0: Port device team_slave_0 added [ 1394.944804][T14917] team0: Port device team_slave_1 added [ 1394.951557][ T338] device bridge_slave_1 left promiscuous mode [ 1394.958209][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.043007][ T338] device bridge_slave_0 left promiscuous mode [ 1395.049385][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.103662][ T338] device bridge_slave_1 left promiscuous mode [ 1395.109843][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.163100][ T338] device bridge_slave_0 left promiscuous mode [ 1395.169234][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.643226][ T338] device hsr_slave_0 left promiscuous mode [ 1396.682597][ T338] device hsr_slave_1 left promiscuous mode [ 1396.728146][ T338] team0 (unregistering): Port device team_slave_1 removed [ 1396.738721][ T338] team0 (unregistering): Port device team_slave_0 removed [ 1396.748485][ T338] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1396.795618][ T338] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1396.876402][ T338] bond0 (unregistering): Released all slaves [ 1397.002888][ T338] device hsr_slave_0 left promiscuous mode [ 1397.062552][ T338] device hsr_slave_1 left promiscuous mode [ 1397.107693][ T338] team0 (unregistering): Port device team_slave_1 removed [ 1397.118846][ T338] team0 (unregistering): Port device team_slave_0 removed [ 1397.128842][ T338] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1397.167386][ T338] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1397.235163][ T338] bond0 (unregistering): Released all slaves [ 1397.364471][T14917] device hsr_slave_0 entered promiscuous mode [ 1397.402721][T14917] device hsr_slave_1 entered promiscuous mode [ 1397.450124][T14920] IPVS: ftp: loaded support on port[0] = 21 [ 1397.543616][T14920] chnl_net:caif_netlink_parms(): no params data found [ 1397.578111][T14920] bridge0: port 1(bridge_slave_0) entered blocking state [ 1397.585594][T14920] bridge0: port 1(bridge_slave_0) entered disabled state [ 1397.593891][T14920] device bridge_slave_0 entered promiscuous mode [ 1397.601714][T14920] bridge0: port 2(bridge_slave_1) entered blocking state [ 1397.608929][T14920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1397.616989][T14920] device bridge_slave_1 entered promiscuous mode [ 1397.704524][T14917] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1397.714867][T14920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1397.734463][T14917] 8021q: adding VLAN 0 to HW filter on device team0 [ 1397.741862][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1397.752206][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1397.763107][T14920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1397.787885][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1397.797375][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1397.809050][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1397.816142][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1397.828462][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1397.837759][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1397.849562][ T1481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1397.856644][ T1481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1397.868228][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1397.877226][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1397.889287][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1397.898022][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1397.934191][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1397.945339][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1397.954582][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1397.967308][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1397.976199][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1397.987573][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1397.996495][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1398.007718][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1398.017791][T14917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1398.029725][T14920] team0: Port device team_slave_0 added [ 1398.041461][T14920] team0: Port device team_slave_1 added [ 1398.058107][T14917] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1398.145073][T14920] device hsr_slave_0 entered promiscuous mode [ 1398.184715][T14920] device hsr_slave_1 entered promiscuous mode [ 1398.232878][T14920] debugfs: Directory 'hsr0' with parent '/' already present! [ 1398.262052][T14920] bridge0: port 2(bridge_slave_1) entered blocking state [ 1398.269167][T14920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1398.276534][T14920] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.283631][T14920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1398.340231][T14920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1398.375316][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1398.383680][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.402899][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1398.420370][T14920] 8021q: adding VLAN 0 to HW filter on device team0 [ 1398.438306][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 12:19:24 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e2800", 0x26}], 0x1}, 0x0) [ 1398.450420][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.457526][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1398.483625][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1398.491994][ T1481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1398.499114][ T1481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1398.517267][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1398.526110][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1398.534680][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1398.546572][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1398.555150][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1398.566936][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1398.578344][T14920] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1398.592577][T14920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1398.717230][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1398.726974][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1398.735241][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1398.753318][T14920] 8021q: adding VLAN 0 to HW filter on device batadv0 12:19:25 executing program 4: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x2, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 12:19:25 executing program 3: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) ioctl$int_in(r2, 0x5421, &(0x7f0000000140)=0x6) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf1, 0x21fc}, 0x14) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 12:19:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0x5, 0x1, 0x4, 0x10000, 0xfd35}) r1 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) shmget$private(0x0, 0x1000, 0x100000000000008, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000001c0)=0x8, 0xfffffdb3) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000340)={'vxcan1\x00', {0x2, 0x4e28, @remote}}) prctl$PR_SET_DUMPABLE(0x4, 0x1) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="200321375f598a9573f6486dde70ac0221ac46c2ab325b123b1e8a300d818cd6f1fb67fb888c", 0x26, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x2, 0x400000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(0x0, 0xffffffffffffffd0, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) fcntl$getown(r2, 0x9) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0xffffffffffffffff) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x2) 12:19:25 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:25 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e2800", 0x26}], 0x1}, 0x0) 12:19:25 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) [ 1399.272409][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1399.278261][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:19:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x20000000003) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 12:19:26 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 1400.718804][T14973] IPVS: ftp: loaded support on port[0] = 21 [ 1400.843263][T14973] chnl_net:caif_netlink_parms(): no params data found [ 1400.870967][T14973] bridge0: port 1(bridge_slave_0) entered blocking state [ 1400.878587][T14973] bridge0: port 1(bridge_slave_0) entered disabled state [ 1400.886274][T14973] device bridge_slave_0 entered promiscuous mode [ 1400.893931][ T338] device bridge_slave_1 left promiscuous mode [ 1400.900265][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1400.963079][ T338] device bridge_slave_0 left promiscuous mode [ 1400.969247][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1401.023664][ T338] device bridge_slave_1 left promiscuous mode [ 1401.029844][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1401.073117][ T338] device bridge_slave_0 left promiscuous mode [ 1401.079281][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1402.552999][ T338] device hsr_slave_0 left promiscuous mode [ 1402.602545][ T338] device hsr_slave_1 left promiscuous mode [ 1402.656993][ T338] team0 (unregistering): Port device team_slave_1 removed [ 1402.669787][ T338] team0 (unregistering): Port device team_slave_0 removed [ 1402.679320][ T338] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1402.726465][ T338] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1402.806263][ T338] bond0 (unregistering): Released all slaves [ 1402.972775][ T338] device hsr_slave_0 left promiscuous mode [ 1403.022609][ T338] device hsr_slave_1 left promiscuous mode [ 1403.068569][ T338] team0 (unregistering): Port device team_slave_1 removed [ 1403.078328][ T338] team0 (unregistering): Port device team_slave_0 removed [ 1403.088404][ T338] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1403.135142][ T338] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1403.206752][ T338] bond0 (unregistering): Released all slaves [ 1403.305343][T14973] bridge0: port 2(bridge_slave_1) entered blocking state [ 1403.312465][T14973] bridge0: port 2(bridge_slave_1) entered disabled state [ 1403.320067][T14973] device bridge_slave_1 entered promiscuous mode [ 1403.335227][T14976] IPVS: ftp: loaded support on port[0] = 21 [ 1403.356072][T14973] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1403.366831][T14973] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1403.390041][T14973] team0: Port device team_slave_0 added [ 1403.401047][T14973] team0: Port device team_slave_1 added [ 1403.465843][T14973] device hsr_slave_0 entered promiscuous mode [ 1403.502807][T14973] device hsr_slave_1 entered promiscuous mode [ 1403.587873][T14976] chnl_net:caif_netlink_parms(): no params data found [ 1403.653255][T14976] bridge0: port 1(bridge_slave_0) entered blocking state [ 1403.660476][T14976] bridge0: port 1(bridge_slave_0) entered disabled state [ 1403.668483][T14976] device bridge_slave_0 entered promiscuous mode [ 1403.728217][T14976] bridge0: port 2(bridge_slave_1) entered blocking state [ 1403.735500][T14976] bridge0: port 2(bridge_slave_1) entered disabled state [ 1403.746631][T14976] device bridge_slave_1 entered promiscuous mode [ 1403.799267][T14976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1403.815632][T14973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1403.827733][T14976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1403.848031][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1403.858878][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1403.869806][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1403.892479][T14973] 8021q: adding VLAN 0 to HW filter on device team0 [ 1403.906217][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1403.915744][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1403.927462][T12602] bridge0: port 1(bridge_slave_0) entered blocking state [ 1403.934569][T12602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1403.946765][T14976] team0: Port device team_slave_0 added [ 1403.967884][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1403.976598][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1403.988774][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1403.998162][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1404.005263][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1404.018062][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1404.028600][T14976] team0: Port device team_slave_1 added [ 1404.046020][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1404.058211][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1404.066871][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1404.098798][T14973] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1404.110771][T14973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1404.120873][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1404.164203][T14976] device hsr_slave_0 entered promiscuous mode [ 1404.222902][T14976] device hsr_slave_1 entered promiscuous mode [ 1404.272462][T14976] debugfs: Directory 'hsr0' with parent '/' already present! [ 1404.291453][T14973] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1404.410328][T14976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1404.422700][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1404.430226][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1404.440268][T14976] 8021q: adding VLAN 0 to HW filter on device team0 [ 1404.465654][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1404.474666][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1404.492585][T12602] bridge0: port 1(bridge_slave_0) entered blocking state [ 1404.499672][T12602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1404.520202][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1404.528773][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1404.537506][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1404.549766][ T1373] bridge0: port 2(bridge_slave_1) entered blocking state [ 1404.556874][ T1373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1404.568426][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1404.577404][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1404.589722][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1404.599201][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1404.708253][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1404.722512][T14976] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1404.734657][T14976] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1404.746692][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1404.756563][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1404.765424][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1404.774407][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1404.786573][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1404.795127][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1404.812051][T14976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1404.821262][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 12:19:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') write$P9_RRENAME(r0, 0x0, 0x2d4) 12:19:31 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r1, 0x0, 0x3, 0x0, 0x0) 12:19:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:31 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r0) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000d7c000)={0x0, r0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:31 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e2800", 0x26}], 0x1}, 0x0) 12:19:31 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:31 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r0) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000d7c000)={0x0, r0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 1405.222407][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1405.228221][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:19:31 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:31 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r0) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000d7c000)={0x0, r0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) [ 1405.513625][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1405.519415][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:19:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xff}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x80ffffff}) [ 1407.188505][T15035] IPVS: ftp: loaded support on port[0] = 21 [ 1407.219427][ T338] device bridge_slave_1 left promiscuous mode [ 1407.225659][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1407.294860][ T338] device bridge_slave_0 left promiscuous mode [ 1407.301062][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1407.354085][ T338] device bridge_slave_1 left promiscuous mode [ 1407.360281][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1407.422981][ T338] device bridge_slave_0 left promiscuous mode [ 1407.429112][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1408.883004][ T338] device hsr_slave_0 left promiscuous mode [ 1408.922501][ T338] device hsr_slave_1 left promiscuous mode [ 1408.968131][ T338] team0 (unregistering): Port device team_slave_1 removed [ 1408.978794][ T338] team0 (unregistering): Port device team_slave_0 removed [ 1408.989154][ T338] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1409.027099][ T338] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1409.106845][ T338] bond0 (unregistering): Released all slaves [ 1409.252933][ T338] device hsr_slave_0 left promiscuous mode [ 1409.292453][ T338] device hsr_slave_1 left promiscuous mode [ 1409.367470][ T338] team0 (unregistering): Port device team_slave_1 removed [ 1409.378673][ T338] team0 (unregistering): Port device team_slave_0 removed [ 1409.388949][ T338] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1409.425198][ T338] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1409.488333][ T338] bond0 (unregistering): Released all slaves [ 1409.592258][T15037] IPVS: ftp: loaded support on port[0] = 21 [ 1409.644829][T15035] chnl_net:caif_netlink_parms(): no params data found [ 1409.691814][T15035] bridge0: port 1(bridge_slave_0) entered blocking state [ 1409.699020][T15035] bridge0: port 1(bridge_slave_0) entered disabled state [ 1409.706648][T15035] device bridge_slave_0 entered promiscuous mode [ 1409.714097][T15035] bridge0: port 2(bridge_slave_1) entered blocking state [ 1409.721148][T15035] bridge0: port 2(bridge_slave_1) entered disabled state [ 1409.728918][T15035] device bridge_slave_1 entered promiscuous mode [ 1409.753423][T15035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1409.764046][T15035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1409.788182][T15035] team0: Port device team_slave_0 added [ 1409.797947][T15035] team0: Port device team_slave_1 added [ 1409.884241][T15035] device hsr_slave_0 entered promiscuous mode [ 1409.922685][T15035] device hsr_slave_1 entered promiscuous mode [ 1410.025165][T15037] chnl_net:caif_netlink_parms(): no params data found [ 1410.112367][T15035] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.119446][T15035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1410.126794][T15035] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.133877][T15035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1410.151089][T15037] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.160060][T15037] bridge0: port 1(bridge_slave_0) entered disabled state [ 1410.170356][T15037] device bridge_slave_0 entered promiscuous mode [ 1410.191320][T15037] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.199470][T15037] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.209298][T15037] device bridge_slave_1 entered promiscuous mode [ 1410.254788][T15035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1410.267706][T15037] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1410.285613][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1410.295235][T12763] bridge0: port 1(bridge_slave_0) entered disabled state [ 1410.304878][T12763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.317977][T15035] 8021q: adding VLAN 0 to HW filter on device team0 [ 1410.328728][T15037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1410.352515][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1410.360772][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.367848][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1410.398042][T15037] team0: Port device team_slave_0 added [ 1410.405098][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1410.416728][T12763] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.423826][T12763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1410.438297][T15037] team0: Port device team_slave_1 added [ 1410.446345][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1410.470421][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1410.481671][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1410.491247][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1410.507657][T15035] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1410.521520][T15035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1410.538263][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1410.595089][T15037] device hsr_slave_0 entered promiscuous mode [ 1410.634145][T15037] device hsr_slave_1 entered promiscuous mode [ 1410.673702][T15037] debugfs: Directory 'hsr0' with parent '/' already present! [ 1410.701102][T15035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1410.789085][T15037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1410.822412][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1410.830126][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1410.856797][T15037] 8021q: adding VLAN 0 to HW filter on device team0 [ 1410.888809][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1410.900924][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1410.909483][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.916584][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1410.968141][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1410.981275][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1410.992304][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1411.001105][ T1481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1411.008205][ T1481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1411.016688][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1411.025502][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1411.034128][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1411.042603][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1411.142563][T15037] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1411.153134][T15037] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1411.167985][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1411.175743][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1411.184638][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1411.195787][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1411.204129][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1411.212786][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1411.220894][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1411.229373][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1411.263509][T15037] 8021q: adding VLAN 0 to HW filter on device batadv0 12:19:37 executing program 4: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x40000, 0x0) clock_gettime(0x0, 0x0) clock_gettime(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) clock_gettime(0x2, 0x0) syz_genetlink_get_family_id$tipc(0x0) 12:19:37 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:37 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x1c5) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:37 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:37 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:37 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:19:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) [ 1411.432428][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.438260][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:19:37 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:37 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) [ 1411.642411][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1411.648180][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:19:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:38 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:38 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x0, 0x3ff}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:38 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:38 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) [ 1413.412939][ T338] device bridge_slave_1 left promiscuous mode [ 1413.419105][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1413.463158][ T338] device bridge_slave_0 left promiscuous mode [ 1413.469322][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 1414.252718][ T338] device hsr_slave_0 left promiscuous mode [ 1414.302605][ T338] device hsr_slave_1 left promiscuous mode [ 1414.377200][ T338] team0 (unregistering): Port device team_slave_1 removed [ 1414.388459][ T338] team0 (unregistering): Port device team_slave_0 removed [ 1414.398265][ T338] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1414.428191][ T338] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1414.506188][ T338] bond0 (unregistering): Released all slaves [ 1414.619556][T15118] IPVS: ftp: loaded support on port[0] = 21 [ 1414.690571][T15118] chnl_net:caif_netlink_parms(): no params data found [ 1414.772548][T15118] bridge0: port 1(bridge_slave_0) entered blocking state [ 1414.779681][T15118] bridge0: port 1(bridge_slave_0) entered disabled state [ 1414.788547][T15118] device bridge_slave_0 entered promiscuous mode [ 1414.796753][T15118] bridge0: port 2(bridge_slave_1) entered blocking state [ 1414.803978][T15118] bridge0: port 2(bridge_slave_1) entered disabled state [ 1414.812031][T15118] device bridge_slave_1 entered promiscuous mode [ 1414.838047][T15118] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1414.849392][T15118] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1414.875322][T15118] team0: Port device team_slave_0 added [ 1414.882779][T15118] team0: Port device team_slave_1 added [ 1414.945018][T15118] device hsr_slave_0 entered promiscuous mode [ 1414.982712][T15118] device hsr_slave_1 entered promiscuous mode [ 1415.038193][T15118] bridge0: port 2(bridge_slave_1) entered blocking state [ 1415.045298][T15118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1415.052665][T15118] bridge0: port 1(bridge_slave_0) entered blocking state [ 1415.059718][T15118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1415.116072][T15118] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1415.127755][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1415.136068][ T1038] bridge0: port 1(bridge_slave_0) entered disabled state [ 1415.143830][ T1038] bridge0: port 2(bridge_slave_1) entered disabled state [ 1415.156563][T15118] 8021q: adding VLAN 0 to HW filter on device team0 [ 1415.167708][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1415.176444][ T1038] bridge0: port 1(bridge_slave_0) entered blocking state [ 1415.183555][ T1038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1415.204819][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1415.214337][ T1373] bridge0: port 2(bridge_slave_1) entered blocking state [ 1415.221423][ T1373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1415.230098][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1415.249718][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1415.258246][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1415.266886][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1415.277619][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1415.287773][T15118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1415.305704][T15118] 8021q: adding VLAN 0 to HW filter on device batadv0 12:19:41 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:41 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:41 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x0, 0x3ff}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:41 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:19:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:41 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) [ 1415.512419][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1415.518246][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:19:41 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:41 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x0, 0x3ff}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:42 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:19:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:42 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:42 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 12:19:42 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x0, 0x3ff}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) [ 1416.392595][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1416.398436][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:19:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:42 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x0, 0x3ff}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:43 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:19:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:43 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) [ 1418.063243][ T7] device bridge_slave_1 left promiscuous mode [ 1418.069403][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.123165][ T7] device bridge_slave_0 left promiscuous mode [ 1418.129331][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1418.942853][ T7] device hsr_slave_0 left promiscuous mode [ 1418.992676][ T7] device hsr_slave_1 left promiscuous mode [ 1419.058276][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1419.068241][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1419.078888][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1419.105762][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1419.175753][ T7] bond0 (unregistering): Released all slaves [ 1419.279110][T15232] IPVS: ftp: loaded support on port[0] = 21 [ 1419.340723][T15232] chnl_net:caif_netlink_parms(): no params data found [ 1419.448372][T15232] bridge0: port 1(bridge_slave_0) entered blocking state [ 1419.459202][T15232] bridge0: port 1(bridge_slave_0) entered disabled state [ 1419.467972][T15232] device bridge_slave_0 entered promiscuous mode [ 1419.479557][T15232] bridge0: port 2(bridge_slave_1) entered blocking state [ 1419.487315][T15232] bridge0: port 2(bridge_slave_1) entered disabled state [ 1419.498823][T15232] device bridge_slave_1 entered promiscuous mode [ 1419.530158][T15232] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1419.545748][T15232] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1419.580680][T15232] team0: Port device team_slave_0 added [ 1419.589634][T15232] team0: Port device team_slave_1 added [ 1419.665073][T15232] device hsr_slave_0 entered promiscuous mode [ 1419.702655][T15232] device hsr_slave_1 entered promiscuous mode [ 1419.751675][T15232] bridge0: port 2(bridge_slave_1) entered blocking state [ 1419.758778][T15232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1419.766176][T15232] bridge0: port 1(bridge_slave_0) entered blocking state [ 1419.773258][T15232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1419.819511][T15232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1419.833422][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1419.841951][ T1038] bridge0: port 1(bridge_slave_0) entered disabled state [ 1419.850822][ T1038] bridge0: port 2(bridge_slave_1) entered disabled state [ 1419.864166][T15232] 8021q: adding VLAN 0 to HW filter on device team0 [ 1419.875319][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1419.884921][ T1373] bridge0: port 1(bridge_slave_0) entered blocking state [ 1419.892003][ T1373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1419.902830][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1419.911070][ T1481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1419.918173][ T1481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1419.933357][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1419.942206][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1419.954818][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1419.966025][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1419.976987][T15232] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1419.988032][T15232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1419.996548][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1420.013559][T15232] 8021q: adding VLAN 0 to HW filter on device batadv0 12:19:46 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 12:19:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:46 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x0, 0x3ff}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:46 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, 0x0, 0x0) 12:19:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:46 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, 0x0, 0x0) 12:19:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) [ 1420.552413][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1420.558211][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:19:46 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 12:19:46 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f00000000c0)={0x0, 0x3ff}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:46 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, 0x0, 0x0) 12:19:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:47 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 12:19:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:47 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) 12:19:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x0, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x0, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfe) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x11, 0xdba}, 'port1\x00', 0x41, 0x400, 0x3f, 0x7fff, 0x1f, 0x1000, 0x1f, 0x0, 0x3, 0x6}) r2 = accept(r1, 0x0, 0x0) dup2(r0, r2) 12:19:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) [ 1421.939876][T15336] IPVS: ftp: loaded support on port[0] = 21 [ 1422.340083][T15338] IPVS: ftp: loaded support on port[0] = 21 [ 1422.643270][T13172] device bridge_slave_1 left promiscuous mode [ 1422.649435][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1422.683366][T13172] device bridge_slave_0 left promiscuous mode [ 1422.689510][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1423.452977][T13172] device hsr_slave_0 left promiscuous mode [ 1423.502520][T13172] device hsr_slave_1 left promiscuous mode [ 1423.548726][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1423.559779][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1423.569745][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1423.596409][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1423.674106][T13172] bond0 (unregistering): Released all slaves [ 1423.778386][T15348] IPVS: ftp: loaded support on port[0] = 21 [ 1423.841837][T15348] chnl_net:caif_netlink_parms(): no params data found [ 1423.869917][T15348] bridge0: port 1(bridge_slave_0) entered blocking state [ 1423.877168][T15348] bridge0: port 1(bridge_slave_0) entered disabled state [ 1423.885133][T15348] device bridge_slave_0 entered promiscuous mode [ 1423.892852][T15348] bridge0: port 2(bridge_slave_1) entered blocking state [ 1423.899973][T15348] bridge0: port 2(bridge_slave_1) entered disabled state [ 1423.907914][T15348] device bridge_slave_1 entered promiscuous mode [ 1423.925567][T15348] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1423.936140][T15348] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1423.954909][T15348] team0: Port device team_slave_0 added [ 1423.961811][T15348] team0: Port device team_slave_1 added [ 1424.035771][T15348] device hsr_slave_0 entered promiscuous mode [ 1424.073083][T15348] device hsr_slave_1 entered promiscuous mode [ 1424.181381][T15348] bridge0: port 2(bridge_slave_1) entered blocking state [ 1424.188606][T15348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1424.195971][T15348] bridge0: port 1(bridge_slave_0) entered blocking state [ 1424.203067][T15348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1424.250082][T15348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1424.267171][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1424.277060][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1424.286453][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1424.299846][T15348] 8021q: adding VLAN 0 to HW filter on device team0 [ 1424.311556][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1424.320780][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1424.327870][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1424.346672][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1424.355507][T12762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1424.362588][T12762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1424.385948][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1424.395768][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1424.406903][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1424.415849][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1424.427963][T15348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1424.436271][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1424.460095][T15348] 8021q: adding VLAN 0 to HW filter on device batadv0 12:19:50 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 12:19:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x0, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfe) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x11, 0xdba}, 'port1\x00', 0x41, 0x400, 0x3f, 0x7fff, 0x1f, 0x1000, 0x1f, 0x0, 0x3, 0x6}) r2 = accept(r1, 0x0, 0x0) dup2(r0, r2) 12:19:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) [ 1424.740338][T15369] IPVS: ftp: loaded support on port[0] = 21 12:19:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:51 executing program 5: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/78, 0x4e) setgid(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000440)) 12:19:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:51 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 12:19:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:51 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, 0x0, 0x0) 12:19:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfe) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x11, 0xdba}, 'port1\x00', 0x41, 0x400, 0x3f, 0x7fff, 0x1f, 0x1000, 0x1f, 0x0, 0x3, 0x6}) r2 = accept(r1, 0x0, 0x0) dup2(r0, r2) 12:19:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:51 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000880)=[{0x0, 0x0, 0x1000}, {&(0x7f0000000600)="6da975c5efb7913c05703b88", 0xc, 0x5}], 0x220880c, 0x0) 12:19:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r0, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:51 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 12:19:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) [ 1425.736752][T15417] IPVS: ftp: loaded support on port[0] = 21 12:19:51 executing program 5: r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/101, 0x65}, {&(0x7f0000000280)=""/91, 0x5b}], 0x2}, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 12:19:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r0, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r0, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfe) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000080)={{0x11, 0xdba}, 'port1\x00', 0x41, 0x400, 0x3f, 0x7fff, 0x1f, 0x1000, 0x1f, 0x0, 0x3, 0x6}) r2 = accept(r1, 0x0, 0x0) dup2(r0, r2) 12:19:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) [ 1426.458474][T15458] IPVS: ftp: loaded support on port[0] = 21 [ 1427.364176][ T7] device bridge_slave_1 left promiscuous mode [ 1427.370429][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1427.423138][ T7] device bridge_slave_0 left promiscuous mode [ 1427.429345][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1428.203048][ T7] device hsr_slave_0 left promiscuous mode [ 1428.262508][ T7] device hsr_slave_1 left promiscuous mode [ 1428.308562][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1428.318601][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1428.329722][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1428.396547][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1428.457803][ T7] bond0 (unregistering): Released all slaves [ 1428.589171][T15466] IPVS: ftp: loaded support on port[0] = 21 [ 1428.650858][T15466] chnl_net:caif_netlink_parms(): no params data found [ 1428.679614][T15466] bridge0: port 1(bridge_slave_0) entered blocking state [ 1428.686759][T15466] bridge0: port 1(bridge_slave_0) entered disabled state [ 1428.694326][T15466] device bridge_slave_0 entered promiscuous mode [ 1428.701721][T15466] bridge0: port 2(bridge_slave_1) entered blocking state [ 1428.708883][T15466] bridge0: port 2(bridge_slave_1) entered disabled state [ 1428.716542][T15466] device bridge_slave_1 entered promiscuous mode [ 1428.735323][T15466] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1428.745944][T15466] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1428.768095][T15466] team0: Port device team_slave_0 added [ 1428.774858][T15466] team0: Port device team_slave_1 added [ 1428.824798][T15466] device hsr_slave_0 entered promiscuous mode [ 1428.862616][T15466] device hsr_slave_1 entered promiscuous mode [ 1429.077564][T15466] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.084673][T15466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1429.092034][T15466] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.099151][T15466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1429.143984][T15466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1429.160449][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1429.169384][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1429.179703][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1429.193374][T15466] 8021q: adding VLAN 0 to HW filter on device team0 [ 1429.204216][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1429.213120][T12762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.220175][T12762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1429.236099][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1429.247574][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.254662][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1429.275103][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1429.286586][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1429.301018][T15466] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1429.315418][T15466] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1429.328070][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1429.339432][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1429.348524][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1429.368488][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1429.380015][T15466] 8021q: adding VLAN 0 to HW filter on device batadv0 12:19:55 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 12:19:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:55 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/50) 12:19:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:19:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:55 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) 12:19:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) [ 1429.672443][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1429.678257][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:19:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:56 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 12:19:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 12:19:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:19:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x7a) 12:19:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, 0x0, 0x0, 0x7a) 12:19:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:19:56 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 12:19:56 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) [ 1430.472560][ C1] protocol 88fb is buggy, dev hsr_slave_0 12:19:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, 0x0, 0x0, 0x7a) 12:19:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, 0x0, 0x189) 12:19:56 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:19:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, 0x0, 0x189) 12:19:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, 0x0, 0x0, 0x7a) 12:19:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:19:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:19:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, 0x0, 0x189) [ 1432.093904][ T7] device bridge_slave_1 left promiscuous mode [ 1432.100096][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1432.153279][ T7] device bridge_slave_0 left promiscuous mode [ 1432.159412][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1432.952980][ T7] device hsr_slave_0 left promiscuous mode [ 1432.992466][ T7] device hsr_slave_1 left promiscuous mode [ 1433.039885][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1433.049993][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1433.061123][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1433.118006][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1433.195339][ T7] bond0 (unregistering): Released all slaves [ 1433.340922][T15567] IPVS: ftp: loaded support on port[0] = 21 [ 1433.416298][T15567] chnl_net:caif_netlink_parms(): no params data found [ 1433.444955][T15567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.452068][T15567] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.459648][T15567] device bridge_slave_0 entered promiscuous mode [ 1433.552525][T15567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.559681][T15567] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.567682][T15567] device bridge_slave_1 entered promiscuous mode [ 1433.626331][T15567] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1433.637220][T15567] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1433.660534][T15567] team0: Port device team_slave_0 added [ 1433.668274][T15567] team0: Port device team_slave_1 added [ 1433.735237][T15567] device hsr_slave_0 entered promiscuous mode [ 1433.772747][T15567] device hsr_slave_1 entered promiscuous mode [ 1433.841908][T15567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.849034][T15567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1433.856404][T15567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.863483][T15567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1433.906077][T15567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1433.919272][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1433.927994][ T1038] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.936776][ T1038] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.950713][T15567] 8021q: adding VLAN 0 to HW filter on device team0 [ 1433.961198][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1433.969598][T12762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.976648][T12762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1433.987001][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1433.996184][T13291] bridge0: port 2(bridge_slave_1) entered blocking state [ 1434.003268][T13291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1434.028815][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1434.038421][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1434.047058][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1434.061706][T15567] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1434.074738][T15567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1434.082890][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1434.091070][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1434.117086][T15567] 8021q: adding VLAN 0 to HW filter on device batadv0 12:20:00 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 12:20:00 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:00 executing program 4: getdents64(0xffffffffffffffff, &(0x7f0000002180)=""/4096, 0x1000) getdents64(0xffffffffffffffff, 0x0, 0x189) 12:20:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 12:20:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:00 executing program 4: getdents64(0xffffffffffffffff, &(0x7f0000002180)=""/4096, 0x1000) getdents64(0xffffffffffffffff, 0x0, 0x189) 12:20:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 12:20:00 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) [ 1434.412408][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1434.418210][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:20:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:00 executing program 4: getdents64(0xffffffffffffffff, &(0x7f0000002180)=""/4096, 0x1000) getdents64(0xffffffffffffffff, 0x0, 0x189) 12:20:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:01 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 12:20:01 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 12:20:01 executing program 4: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:20:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:01 executing program 1: 12:20:01 executing program 4: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:20:01 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:01 executing program 2: 12:20:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:01 executing program 1: 12:20:01 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:01 executing program 4: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:20:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(0xffffffffffffffff, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:20:01 executing program 1: 12:20:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:01 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(0xffffffffffffffff, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:20:01 executing program 1: [ 1436.583097][ T7] device bridge_slave_1 left promiscuous mode [ 1436.589282][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.653227][ T7] device bridge_slave_0 left promiscuous mode [ 1436.659397][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1437.422816][ T7] device hsr_slave_0 left promiscuous mode [ 1437.462902][ T7] device hsr_slave_1 left promiscuous mode [ 1437.517766][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1437.528525][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1437.539106][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1437.585678][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1437.655916][ T7] bond0 (unregistering): Released all slaves [ 1437.778648][T15663] IPVS: ftp: loaded support on port[0] = 21 [ 1437.837391][T15663] chnl_net:caif_netlink_parms(): no params data found [ 1437.862213][T15663] bridge0: port 1(bridge_slave_0) entered blocking state [ 1437.869558][T15663] bridge0: port 1(bridge_slave_0) entered disabled state [ 1437.877356][T15663] device bridge_slave_0 entered promiscuous mode [ 1437.932672][T15663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1437.939931][T15663] bridge0: port 2(bridge_slave_1) entered disabled state [ 1437.950879][T15663] device bridge_slave_1 entered promiscuous mode [ 1437.975026][T15663] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1437.989417][T15663] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1438.012190][T15663] team0: Port device team_slave_0 added [ 1438.020092][T15663] team0: Port device team_slave_1 added [ 1438.078609][T15663] device hsr_slave_0 entered promiscuous mode [ 1438.135673][T15663] device hsr_slave_1 entered promiscuous mode [ 1438.183366][T15663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1438.190487][T15663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1438.197897][T15663] bridge0: port 1(bridge_slave_0) entered blocking state [ 1438.205002][T15663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1438.245879][T15663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1438.258069][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1438.266769][T12603] bridge0: port 1(bridge_slave_0) entered disabled state [ 1438.274673][T12603] bridge0: port 2(bridge_slave_1) entered disabled state [ 1438.287096][T15663] 8021q: adding VLAN 0 to HW filter on device team0 [ 1438.297598][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1438.306138][T12603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1438.313323][T12603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1438.324575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1438.342711][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1438.349764][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1438.368845][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1438.378077][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1438.389553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1438.405299][T15663] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1438.415999][T15663] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1438.428379][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1438.439897][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1438.448314][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1438.468327][T15663] 8021q: adding VLAN 0 to HW filter on device batadv0 12:20:04 executing program 2: 12:20:04 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:04 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:04 executing program 1: 12:20:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(0xffffffffffffffff, &(0x7f0000002180)=""/4096, 0x1000) getdents64(r0, 0x0, 0x189) 12:20:04 executing program 1: 12:20:04 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) [ 1438.642564][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.648351][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1438.654230][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.659985][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:20:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, 0x0, 0x0) getdents64(r0, 0x0, 0x189) 12:20:04 executing program 2: [ 1438.792602][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.798406][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1438.802141][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.809911][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:20:04 executing program 1: 12:20:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, 0x0, 0x0) getdents64(r0, 0x0, 0x189) 12:20:05 executing program 5: unshare(0x2000400) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) [ 1438.944968][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1438.950801][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:20:05 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:05 executing program 2: 12:20:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:05 executing program 1: 12:20:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, 0x0, 0x0) getdents64(r0, 0x0, 0x189) 12:20:05 executing program 5: unshare(0x2000400) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000300)="55ffc3fcb099fc4f31111548f83071964f4b6366f313efcaf3801df2cd9235ca2ea6f41a4826d2fde6d5b9b2c3aad9e5ba2a5bba85eca24bc33f12ad909c27cc3757f6e0d140c56bfba955afdd1a21ae745429177f83959c19be63f40b50501454061ed1bb3704dfc7c19bd72db7a0f633915593c078976d521a7fd5e90aeaa9cc78cded27209ffc59316cf5de0c6385", 0x90) 12:20:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r1, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001940)="a5b74325f4900180add55fa056c0604f681902218d2caea28c46112d59161fb7ad49a51f0e8e35bccd828c5ae2581cb68c97dd8861a8999cd733184c7c8ca9138ad4fd6b344e4ac18311b2051e3e70f48aa3f23a8243fc591c1683267408124e52cd3b78e71aea4d8e0a4143b727fb72caae99ab144482fce2ee516df04b5ad133fba6ed4b8bd344784168814e2dfbd245884315ae6d3ab3917fd63fc40df0844246c026d6934c6e0c0ea9eca6daa6446161e7af3a2e9d09cb2213e94fd8a226135878c300f448f2dd", 0xc9}], 0x1}}], 0x1, 0x0) sendmsg$inet(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001b80)="9e790d5419521449842563c2715987aae8d5efa77decef1a68668d3e138677b12a44b22d8cace3855bcf92b7e18e45b411426fca98099a5a40dbfe85b47381ff8c8a166cc14b2add14d91a911729be07aab2b9fd8b6430b99bb2e7f2ee4cb1ac321287ee59d36b745567e4a65f665745543c0ec39ce23a3e992b7d0bac3721a34dff2ed3b9acf5cf94491b09d877d4f3f749a013d5cd7db0cce549f9763a79d99e9b5f6fbd9a5b769d9e4fa2d0a51c9dde860877777ece752541ba41fe2c957e70497462c4f028b35b9fde71c077435fe8b2cb806efbea6b51d659ec7037831b3f37650e493f3a942ceb3f724f2e06ef6e7ce5553f733ec14152ba611e31705ec1fb88f3779a4c3c09376eb7fd354e396791e91d84cce8f18093248a9febdb8487eebb2db3680ef78e284ea8ca41eccee9055fa0e481c163970d63e77b94132851dda1e14b0f015008092fa85187b29e8f529a5c04e26ef8bfdca1f6dccee54886968686df1b2700127bfde4bf6a1c88495aa2ffe3b22195a56822aec546a803da1b610581f391adef6753f87984450249521df9c40fb1608f2c3226694f20da7e4410099b6d95ee0d4dedd26a7e7984a19faa3d495b7536e84826468faca8ca025ed5aca9d7936d2fce4c31a9d22cd9cdaa3a243fcf380ce31a308f3d66128a9d67c51fefb3add2ba8e8363901037e94055a89e691c367bf78e9f00", 0x1fc}], 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 12:20:05 executing program 5: unshare(0x2000400) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(0xffffffffffffffff, 0x0, 0x189) 12:20:05 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:05 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000140)=0x6) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 12:20:05 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:05 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001bc0)="01", 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000001a00)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000600)='0', 0x33c00}], 0x1}, 0x0) 12:20:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(0xffffffffffffffff, 0x0, 0x189) 12:20:05 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:05 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nfsfs\x00') getdents64(r0, &(0x7f0000002180)=""/4096, 0x1000) getdents64(0xffffffffffffffff, 0x0, 0x189) 12:20:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:06 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:06 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:06 executing program 4: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x0, 0x6, 0x70e2, 0x7, 0x0, 0x5, 0x6, 0x1, 0x0, 0x1, 0x0, 0x81, 0x7, 0x8, 0x5, 0x0, 0x3f, 0x7, 0x100000001, 0x0, 0x0, 0x7, 0x4, 0x8000, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0xfffffffffffff13d, 0x6da7, 0x0, 0x0, 0x1, 0x1}, 0x0, 0x2, r2, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000005c0)={0x1, &(0x7f0000000480)=[{0x7, 0x955c, 0x7, 0x7fff}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x4004000) socketpair(0xd, 0xf, 0x0, &(0x7f00000002c0)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fwL-t\xfc\xaa\x12m\x03\xb9bM\xba\xf1\x02\xf9\xcc`rtA\xa6\x9d\x86\xfc\xd2\x8d\xb6L\xc7Nw\xf9UU#8\xa1\xb7\v\xa4yu\xbc\xb9FnRHm\xf7\xf62B\xf3\xc5\xdbi\x82\xe5\x13\xcd<=_\x88\t\x9c\xd5@\xb5\x8b\xdet\xd1\xa1\x040/eH\xba\xabL\x87Zvy\b4\tqT,[\x852\xc4Yf\xdc]\xcc\x18h\xf2\xbf)\x8eg\f\"-\x1a\x99\x0e\xc3\x1cg\xd2\x8f\xb8\xc9P\x05\xdb\xb6\x1a;]\xa2\xb3\xe1J\xba\xcbK\xe2x\xae9\x85\xc8F\xb4b\'', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000440)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0x7, &(0x7f0000000200)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xae48}, @call={0x85, 0x0, 0x0, 0x5}, @ldst={0x3, 0x3, 0x0, 0x5, 0x5, 0x8, 0xfffffffffffffff4}, @map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x80000001, 0xe5d, 0x5fb797fe, 0x5f0769ab, 0x5}], &(0x7f0000000240)='GPL\x00', 0x5, 0x96, &(0x7f0000000300)=""/150, 0x41f00, 0x1, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x0, 0x34c, 0x16}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x9f, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000, 0x0, 0x0, 0x2, 0x5, 0x3, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1a1ae1dd, 0x4, 0x7f, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x745, 0x7, 0xfffffffffffffffa, 0x0, 0x7, 0x0, @perf_config_ext, 0x802, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4}, 0x0, 0x0, r2, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0x8) socket$kcm(0x29, 0x5, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000000)) 12:20:06 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffff3) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r4, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) r5 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'team_slave_1\x00', @remote}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000003c0)={'hwsim0\x00', 0x20}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xe) openat$cgroup_ro(r5, &(0x7f00000005c0), 0x7a05, 0x1700) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="010070a200000000000000009dcefb8b2afc25790fc340a23e5ce80e3834202d7a573965d7dd269a3b3c4c97b6fed766eebc803629744bf7be92c65afe01fe81f31ac1e4ee8dc5ee161d55c3931038f20825ecc860646d3742af8050211d8e2b51740823babf831b7d869712d6ff3f6900d9b2b407d76128410cf6aa1fac77554e2218d44105ecf1870d7cbdbdbcf17281c48df66bef2c97253097f8350add096322ba5e4eca"]) 12:20:06 executing program 5: unshare(0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:06 executing program 2: 12:20:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:06 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:06 executing program 4: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x0, 0x6, 0x70e2, 0x7, 0x0, 0x5, 0x6, 0x1, 0x0, 0x1, 0x0, 0x81, 0x7, 0x8, 0x5, 0x0, 0x3f, 0x7, 0x100000001, 0x0, 0x0, 0x7, 0x4, 0x8000, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0xfffffffffffff13d, 0x6da7, 0x0, 0x0, 0x1, 0x1}, 0x0, 0x2, r2, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000005c0)={0x1, &(0x7f0000000480)=[{0x7, 0x955c, 0x7, 0x7fff}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x4004000) socketpair(0xd, 0xf, 0x0, &(0x7f00000002c0)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fwL-t\xfc\xaa\x12m\x03\xb9bM\xba\xf1\x02\xf9\xcc`rtA\xa6\x9d\x86\xfc\xd2\x8d\xb6L\xc7Nw\xf9UU#8\xa1\xb7\v\xa4yu\xbc\xb9FnRHm\xf7\xf62B\xf3\xc5\xdbi\x82\xe5\x13\xcd<=_\x88\t\x9c\xd5@\xb5\x8b\xdet\xd1\xa1\x040/eH\xba\xabL\x87Zvy\b4\tqT,[\x852\xc4Yf\xdc]\xcc\x18h\xf2\xbf)\x8eg\f\"-\x1a\x99\x0e\xc3\x1cg\xd2\x8f\xb8\xc9P\x05\xdb\xb6\x1a;]\xa2\xb3\xe1J\xba\xcbK\xe2x\xae9\x85\xc8F\xb4b\'', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000440)={r2}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x17, 0x7, &(0x7f0000000200)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xae48}, @call={0x85, 0x0, 0x0, 0x5}, @ldst={0x3, 0x3, 0x0, 0x5, 0x5, 0x8, 0xfffffffffffffff4}, @map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x80000001, 0xe5d, 0x5fb797fe, 0x5f0769ab, 0x5}], &(0x7f0000000240)='GPL\x00', 0x5, 0x96, &(0x7f0000000300)=""/150, 0x41f00, 0x1, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x0, 0x34c, 0x16}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x9f, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000, 0x0, 0x0, 0x2, 0x5, 0x3, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1a1ae1dd, 0x4, 0x7f, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x745, 0x7, 0xfffffffffffffffa, 0x0, 0x7, 0x0, @perf_config_ext, 0x802, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4}, 0x0, 0x0, r2, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0x8) socket$kcm(0x29, 0x5, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000000)) 12:20:06 executing program 5: unshare(0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:06 executing program 2: 12:20:06 executing program 5: unshare(0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:07 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:07 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffff3) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r4, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) r5 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'team_slave_1\x00', @remote}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000003c0)={'hwsim0\x00', 0x20}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xe) openat$cgroup_ro(r5, &(0x7f00000005c0), 0x7a05, 0x1700) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="010070a200000000000000009dcefb8b2afc25790fc340a23e5ce80e3834202d7a573965d7dd269a3b3c4c97b6fed766eebc803629744bf7be92c65afe01fe81f31ac1e4ee8dc5ee161d55c3931038f20825ecc860646d3742af8050211d8e2b51740823babf831b7d869712d6ff3f6900d9b2b407d76128410cf6aa1fac77554e2218d44105ecf1870d7cbdbdbcf17281c48df66bef2c97253097f8350add096322ba5e4eca"]) 12:20:07 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040), 0xfffffffffffffff3) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x280000, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r4, &(0x7f0000000000)={[{0x2dcd3, 'memory', 0xe}]}, 0x200600) r5 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'team_slave_1\x00', @remote}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000003c0)={'hwsim0\x00', 0x20}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xe) openat$cgroup_ro(r5, &(0x7f00000005c0), 0x7a05, 0x1700) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="010070a200000000000000009dcefb8b2afc25790fc340a23e5ce80e3834202d7a573965d7dd269a3b3c4c97b6fed766eebc803629744bf7be92c65afe01fe81f31ac1e4ee8dc5ee161d55c3931038f20825ecc860646d3742af8050211d8e2b51740823babf831b7d869712d6ff3f6900d9b2b407d76128410cf6aa1fac77554e2218d44105ecf1870d7cbdbdbcf17281c48df66bef2c97253097f8350add096322ba5e4eca"]) 12:20:07 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:07 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:07 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x0, r1/1000+10000}, 0x8) listen(r0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 12:20:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:07 executing program 2: 12:20:07 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x119) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000980)="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", 0xdeb}], 0x1) write$P9_RFLUSH(r1, &(0x7f0000000440)={0x7}, 0x7) write$P9_RREADLINK(r1, &(0x7f0000000240)=ANY=[], 0xc9) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18}, 0x18) sendfile(r0, r1, &(0x7f0000d83ff8), 0x40008000ffffdffe) 12:20:07 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000056cb181b687f5d1e3ce25100000000000000000000eaff00000000000000000000000000000000000000000000000000002000e600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002ec63300"/291], 0x123) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) sendto$inet(r0, &(0x7f0000000c00)="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", 0xffffffffffffffc3, 0x10, 0x0, 0xfffffffffffffe74) 12:20:07 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:07 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) [ 1441.689347][T13291] hid-generic 0000:0000:0004.0002: item fetching failed at offset -1755745663 [ 1441.698963][T15858] UHID_CREATE from different security context by process 123 (syz-executor.1), this is not allowed. [ 1441.725208][T13291] hid-generic: probe of 0000:0000:0004.0002 failed with error -22 12:20:07 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:07 executing program 1: 12:20:07 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:08 executing program 4: 12:20:08 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:08 executing program 1: 12:20:08 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:08 executing program 2: 12:20:08 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:08 executing program 1: 12:20:08 executing program 4: 12:20:08 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:08 executing program 2: 12:20:08 executing program 1: 12:20:08 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) pselect6(0x40, &(0x7f0000000040)={0x28}, 0x0, 0x0, 0x0, 0x0) 12:20:08 executing program 4: 12:20:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:08 executing program 2: 12:20:08 executing program 1: 12:20:08 executing program 4: 12:20:09 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af04, &(0x7f00000001c0)=ANY=[]) 12:20:09 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:20:09 executing program 2: 12:20:09 executing program 1: 12:20:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:09 executing program 4: 12:20:09 executing program 1: 12:20:09 executing program 2: 12:20:09 executing program 4: 12:20:09 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, 0x0) 12:20:09 executing program 4: 12:20:09 executing program 1: 12:20:09 executing program 2: 12:20:09 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:20:09 executing program 2: 12:20:09 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, 0x0) 12:20:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:09 executing program 4: 12:20:09 executing program 1: 12:20:10 executing program 4: 12:20:10 executing program 2: 12:20:10 executing program 1: 12:20:10 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, 0x0) 12:20:10 executing program 2: 12:20:10 executing program 1: 12:20:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:10 executing program 4: 12:20:10 executing program 1: 12:20:10 executing program 2: 12:20:10 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:20:10 executing program 0: 12:20:10 executing program 4: 12:20:10 executing program 2: 12:20:10 executing program 0: 12:20:10 executing program 1: 12:20:11 executing program 0: 12:20:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:11 executing program 4: 12:20:11 executing program 1: 12:20:11 executing program 2: 12:20:11 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 12:20:11 executing program 0: 12:20:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:11 executing program 4: 12:20:11 executing program 2: 12:20:11 executing program 1: 12:20:11 executing program 4: 12:20:11 executing program 2: 12:20:11 executing program 0: 12:20:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0x5, 0x1, 0x4, 0x10000, 0xfd35}) r1 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) shmget$private(0x0, 0x1000, 0x100000000000008, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000001c0)=0x8, 0xfffffdb3) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000340)={'vxcan1\x00', {0x2, 0x4e28, @remote}}) prctl$PR_SET_DUMPABLE(0x4, 0x1) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="200321375f598a9573f6486dde70ac0221ac46c2ab325b123b1e8a300d818cd6f1fb67fb888c", 0x26, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x2, 0x400000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(0x0, 0xffffffffffffffd0, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) fcntl$getown(r2, 0x9) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0xffffffffffffffff) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @sack_perm, @mss, @window, @sack_perm], 0x20000000000001f4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r0, 0x2) 12:20:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:12 executing program 4: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f00000002c0)=""/148) 12:20:12 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 12:20:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[@ANYRES16], 0x103) recvmmsg(r1, &(0x7f0000006ac0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)=""/49, 0xf}], 0x1}}], 0x2, 0x0, 0x0) 12:20:12 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x2d, 0x6, 0x0, {0x0, 0x0, 0xf, 0x0, '/dev/vhost-net\x00'}}, 0x38) 12:20:12 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x38, 0x6, 0x0, {0x0, 0x0, 0xf, 0x0, '/dev/vhost-net\x00'}}, 0x38) 12:20:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:12 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x80000000000003, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af04, 0x0) 12:20:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) [ 1446.792409][ C1] net_ratelimit: 8 callbacks suppressed [ 1446.792417][ C1] protocol 88fb is buggy, dev hsr_slave_0 12:20:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:13 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:20:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:13 executing program 5: unshare(0x2000400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 12:20:13 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 12:20:13 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:20:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:13 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, 0x0, 0x0) 12:20:13 executing program 4: socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:13 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 12:20:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {0x0}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:20:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:14 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:14 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:14 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 12:20:14 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:20:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:14 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:20:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) [ 1448.746435][T16137] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:20:14 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e2800", 0x26}], 0x1}, 0x0) 12:20:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) [ 1449.061598][T16139] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1449.873164][ T7] device bridge_slave_1 left promiscuous mode [ 1449.879339][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1449.922925][ T7] device bridge_slave_0 left promiscuous mode [ 1449.929063][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1450.732905][ T7] device hsr_slave_0 left promiscuous mode [ 1450.772642][ T7] device hsr_slave_1 left promiscuous mode [ 1450.818139][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1450.828300][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1450.839444][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1450.866018][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1450.960410][ T7] bond0 (unregistering): Released all slaves [ 1451.090513][T16154] IPVS: ftp: loaded support on port[0] = 21 [ 1451.090602][T16156] IPVS: ftp: loaded support on port[0] = 21 [ 1451.226326][T16156] chnl_net:caif_netlink_parms(): no params data found [ 1451.240793][T16154] chnl_net:caif_netlink_parms(): no params data found [ 1451.323726][T16156] bridge0: port 1(bridge_slave_0) entered blocking state [ 1451.331151][T16156] bridge0: port 1(bridge_slave_0) entered disabled state [ 1451.339707][T16156] device bridge_slave_0 entered promiscuous mode [ 1451.356043][T16154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1451.364079][T16154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1451.373321][T16154] device bridge_slave_0 entered promiscuous mode [ 1451.381485][T16156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1451.389196][T16156] bridge0: port 2(bridge_slave_1) entered disabled state [ 1451.397856][T16156] device bridge_slave_1 entered promiscuous mode [ 1451.406462][T16154] bridge0: port 2(bridge_slave_1) entered blocking state [ 1451.414227][T16154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1451.422945][T16154] device bridge_slave_1 entered promiscuous mode [ 1451.443793][T16156] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1451.459286][T16156] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1451.475444][T16154] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1451.505692][T16154] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1451.531377][T16156] team0: Port device team_slave_0 added [ 1451.540878][T16156] team0: Port device team_slave_1 added [ 1451.554573][T16154] team0: Port device team_slave_0 added [ 1451.561857][T16154] team0: Port device team_slave_1 added [ 1451.626563][T16156] device hsr_slave_0 entered promiscuous mode [ 1451.702649][T16156] device hsr_slave_1 entered promiscuous mode [ 1451.824830][T16154] device hsr_slave_0 entered promiscuous mode [ 1451.862645][T16154] device hsr_slave_1 entered promiscuous mode [ 1451.902412][T16154] debugfs: Directory 'hsr0' with parent '/' already present! [ 1451.919187][T16156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1451.926240][T16156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1451.933577][T16156] bridge0: port 1(bridge_slave_0) entered blocking state [ 1451.940626][T16156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1451.958279][T16154] bridge0: port 2(bridge_slave_1) entered blocking state [ 1451.965341][T16154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1451.972683][T16154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1451.979710][T16154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1452.030693][T16156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1452.068342][T16156] 8021q: adding VLAN 0 to HW filter on device team0 [ 1452.082939][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1452.090963][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1452.098718][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1452.110058][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1452.118449][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1452.148248][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1452.157021][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1452.165874][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1452.172965][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1452.180474][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1452.189004][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1452.197286][ T1481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1452.204369][ T1481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1452.213434][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1452.229882][T16154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1452.243923][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1452.253102][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1452.261509][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1452.270844][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1452.280140][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1452.294702][T16156] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1452.305301][T16156] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1452.322477][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1452.330301][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1452.338858][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1452.347536][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1452.359082][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1452.367440][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1452.380364][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1452.387984][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1452.404839][T16154] 8021q: adding VLAN 0 to HW filter on device team0 [ 1452.416176][T16156] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1452.425744][ T3336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1452.434766][ T3336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1452.443429][ T3336] bridge0: port 1(bridge_slave_0) entered blocking state [ 1452.450486][ T3336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1452.463697][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1452.477742][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1452.486200][T12603] bridge0: port 2(bridge_slave_1) entered blocking state [ 1452.493285][T12603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1452.501186][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1452.512623][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1452.523915][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1452.533889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1452.543646][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1452.576936][ T3336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1452.586134][ T3336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1452.594803][ T3336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1452.603499][ T3336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1452.611752][ T3336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 12:20:18 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {0x0}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) 12:20:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:18 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) [ 1452.625544][ T3336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1452.637528][T16154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1452.661601][T16154] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1453.248400][T16168] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:20:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:19 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0xa2ffff) 12:20:19 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 12:20:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0xa2ffff) 12:20:19 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0xa2ffff) 12:20:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0xa2ffff) 12:20:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 1454.042137][T16190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:20:20 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1454.656460][T16210] IPVS: ftp: loaded support on port[0] = 21 [ 1454.918313][T16210] chnl_net:caif_netlink_parms(): no params data found [ 1454.941029][T16210] bridge0: port 1(bridge_slave_0) entered blocking state [ 1454.948510][T16210] bridge0: port 1(bridge_slave_0) entered disabled state [ 1454.956121][T16210] device bridge_slave_0 entered promiscuous mode [ 1455.055112][T16210] bridge0: port 2(bridge_slave_1) entered blocking state [ 1455.062155][T16210] bridge0: port 2(bridge_slave_1) entered disabled state [ 1455.070136][T16210] device bridge_slave_1 entered promiscuous mode [ 1455.087439][T16210] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1455.098583][T16210] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1455.207304][T16210] team0: Port device team_slave_0 added [ 1455.214958][T16210] team0: Port device team_slave_1 added [ 1455.264745][T16210] device hsr_slave_0 entered promiscuous mode [ 1455.302659][T16210] device hsr_slave_1 entered promiscuous mode [ 1455.342403][T16210] debugfs: Directory 'hsr0' with parent '/' already present! [ 1455.445807][T16210] bridge0: port 2(bridge_slave_1) entered blocking state [ 1455.452926][T16210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1455.460253][T16210] bridge0: port 1(bridge_slave_0) entered blocking state [ 1455.467352][T16210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1455.498453][T16210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1455.511624][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1455.521152][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1455.529328][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1455.542024][T16210] 8021q: adding VLAN 0 to HW filter on device team0 [ 1455.549784][ T7] device bridge_slave_1 left promiscuous mode [ 1455.560072][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1455.612868][ T7] device bridge_slave_0 left promiscuous mode [ 1455.619044][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1455.673713][ T7] device bridge_slave_1 left promiscuous mode [ 1455.680032][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1455.723479][ T7] device bridge_slave_0 left promiscuous mode [ 1455.729620][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1455.783864][ T7] device bridge_slave_1 left promiscuous mode [ 1455.790082][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1455.833088][ T7] device bridge_slave_0 left promiscuous mode [ 1455.839321][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1457.943287][ T7] device hsr_slave_0 left promiscuous mode [ 1458.022536][ T7] device hsr_slave_1 left promiscuous mode [ 1458.089087][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1458.098957][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1458.109117][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1458.145172][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1458.222481][ T7] bond0 (unregistering): Released all slaves [ 1458.383217][ T7] device hsr_slave_0 left promiscuous mode [ 1458.442487][ T7] device hsr_slave_1 left promiscuous mode [ 1458.489400][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1458.500487][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1458.510779][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1458.557191][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1458.624809][ T7] bond0 (unregistering): Released all slaves [ 1458.783090][ T7] device hsr_slave_0 left promiscuous mode [ 1458.822568][ T7] device hsr_slave_1 left promiscuous mode [ 1458.869257][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1458.879024][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1458.894003][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1458.945130][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1459.014017][ T7] bond0 (unregistering): Released all slaves [ 1459.107888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1459.109345][T16213] IPVS: ftp: loaded support on port[0] = 21 [ 1459.116805][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1459.128996][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1459.137155][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1459.145908][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1459.152992][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1459.195174][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1459.203711][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1459.212197][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1459.220794][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1459.229428][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1459.241409][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1459.249947][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1459.264599][T16210] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1459.276332][T16210] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1459.286337][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1459.294642][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1459.316941][T16210] 8021q: adding VLAN 0 to HW filter on device batadv0 12:20:25 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000140)=0x6) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf1, 0x21fc}, 0x14) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 12:20:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 1459.496010][T16213] chnl_net:caif_netlink_parms(): no params data found [ 1459.588827][T16213] bridge0: port 1(bridge_slave_0) entered blocking state [ 1459.606218][T16213] bridge0: port 1(bridge_slave_0) entered disabled state [ 1459.623944][T16213] device bridge_slave_0 entered promiscuous mode [ 1459.644770][T16213] bridge0: port 2(bridge_slave_1) entered blocking state [ 1459.663375][T16213] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.680918][T16213] device bridge_slave_1 entered promiscuous mode [ 1459.930366][T16213] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1459.946302][T16213] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1459.975020][T16213] team0: Port device team_slave_0 added [ 1459.985276][T16213] team0: Port device team_slave_1 added [ 1460.044862][T16213] device hsr_slave_0 entered promiscuous mode [ 1460.092688][T16213] device hsr_slave_1 entered promiscuous mode [ 1460.132445][T16213] debugfs: Directory 'hsr0' with parent '/' already present! [ 1460.148584][T16213] bridge0: port 2(bridge_slave_1) entered blocking state [ 1460.155681][T16213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1460.163040][T16213] bridge0: port 1(bridge_slave_0) entered blocking state [ 1460.170094][T16213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1460.179752][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1460.187963][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1460.232505][T16213] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1460.244702][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1460.253843][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1460.264331][T16213] 8021q: adding VLAN 0 to HW filter on device team0 [ 1460.274245][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1460.283113][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1460.291484][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1460.298580][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1460.324722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1460.333768][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1460.342259][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1460.349357][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1460.362097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1460.371939][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1460.380667][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1460.389570][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1460.398243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1460.410773][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1460.419564][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1460.430633][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1460.439314][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1460.450370][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1460.460582][T16213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1460.468862][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1460.494003][T16213] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1460.645526][T16231] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:20:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 12:20:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:26 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 12:20:26 executing program 1: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000140)=0x6) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf1, 0x21fc}, 0x14) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 12:20:26 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:27 executing program 0: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:27 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:27 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1461.428671][T16241] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:20:28 executing program 0: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:28 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:28 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1462.379131][T16244] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:20:28 executing program 0: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1462.670595][T16247] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1463.119394][T16250] IPVS: ftp: loaded support on port[0] = 21 [ 1463.439560][T16250] chnl_net:caif_netlink_parms(): no params data found [ 1463.466597][T16254] IPVS: ftp: loaded support on port[0] = 21 [ 1463.476612][T16255] IPVS: ftp: loaded support on port[0] = 21 [ 1463.593556][T16250] bridge0: port 1(bridge_slave_0) entered blocking state [ 1463.600829][T16250] bridge0: port 1(bridge_slave_0) entered disabled state [ 1463.609737][T16250] device bridge_slave_0 entered promiscuous mode [ 1463.619629][T16250] bridge0: port 2(bridge_slave_1) entered blocking state [ 1463.626823][T16250] bridge0: port 2(bridge_slave_1) entered disabled state [ 1463.634850][T16250] device bridge_slave_1 entered promiscuous mode [ 1463.849204][T16250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1463.860100][T16250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1463.884128][T16250] team0: Port device team_slave_0 added [ 1463.976257][T16250] team0: Port device team_slave_1 added [ 1464.036494][T16254] chnl_net:caif_netlink_parms(): no params data found [ 1464.105213][T16250] device hsr_slave_0 entered promiscuous mode [ 1464.153251][T16250] device hsr_slave_1 entered promiscuous mode [ 1464.212446][T16250] debugfs: Directory 'hsr0' with parent '/' already present! [ 1464.244428][ T7] device bridge_slave_1 left promiscuous mode [ 1464.250860][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1464.293182][ T7] device bridge_slave_0 left promiscuous mode [ 1464.299329][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1464.343347][ T7] device bridge_slave_1 left promiscuous mode [ 1464.349593][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1464.393178][ T7] device bridge_slave_0 left promiscuous mode [ 1464.399402][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1464.453789][ T7] device bridge_slave_1 left promiscuous mode [ 1464.460046][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1464.502940][ T7] device bridge_slave_0 left promiscuous mode [ 1464.509079][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1466.915210][ T7] device hsr_slave_0 left promiscuous mode [ 1466.952567][ T7] device hsr_slave_1 left promiscuous mode [ 1466.998569][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1467.010601][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1467.020730][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1467.056126][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1467.124735][ T7] bond0 (unregistering): Released all slaves [ 1467.253174][ T7] device hsr_slave_0 left promiscuous mode [ 1467.292610][ T7] device hsr_slave_1 left promiscuous mode [ 1467.347462][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1467.358556][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1467.368635][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1467.435673][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1467.505596][ T7] bond0 (unregistering): Released all slaves [ 1467.643104][ T7] device hsr_slave_0 left promiscuous mode [ 1467.684321][ T7] device hsr_slave_1 left promiscuous mode [ 1467.728927][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1467.741336][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1467.752805][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1467.776321][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1467.859439][ T7] bond0 (unregistering): Released all slaves [ 1467.991548][T16258] IPVS: ftp: loaded support on port[0] = 21 [ 1468.010767][T16254] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.021832][T16254] bridge0: port 1(bridge_slave_0) entered disabled state [ 1468.030128][T16254] device bridge_slave_0 entered promiscuous mode [ 1468.038461][T16255] chnl_net:caif_netlink_parms(): no params data found [ 1468.055065][T16254] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.062138][T16254] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.069967][T16254] device bridge_slave_1 entered promiscuous mode [ 1468.121626][T16254] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1468.145844][T16255] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.153766][T16255] bridge0: port 1(bridge_slave_0) entered disabled state [ 1468.161954][T16255] device bridge_slave_0 entered promiscuous mode [ 1468.174240][T16254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1468.188704][T16255] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.196695][T16255] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.204678][T16255] device bridge_slave_1 entered promiscuous mode [ 1468.229396][T16254] team0: Port device team_slave_0 added [ 1468.247610][T16255] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1468.258243][T16255] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1468.269064][T16254] team0: Port device team_slave_1 added [ 1468.326370][T16254] device hsr_slave_0 entered promiscuous mode [ 1468.382957][T16254] device hsr_slave_1 entered promiscuous mode [ 1468.426684][T16255] team0: Port device team_slave_0 added [ 1468.434996][T16255] team0: Port device team_slave_1 added [ 1468.467914][T16254] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.475028][T16254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1468.482418][T16254] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.489495][T16254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1468.545142][T16255] device hsr_slave_0 entered promiscuous mode [ 1468.582817][T16255] device hsr_slave_1 entered promiscuous mode [ 1468.632506][T16255] debugfs: Directory 'hsr0' with parent '/' already present! [ 1468.656056][T16250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1468.692237][T12763] bridge0: port 1(bridge_slave_0) entered disabled state [ 1468.701576][T12763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.711985][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1468.720016][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1468.729315][T16250] 8021q: adding VLAN 0 to HW filter on device team0 [ 1468.736595][T16258] chnl_net:caif_netlink_parms(): no params data found [ 1468.774479][T16258] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.782473][T16258] bridge0: port 1(bridge_slave_0) entered disabled state [ 1468.790136][T16258] device bridge_slave_0 entered promiscuous mode [ 1468.797809][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1468.808422][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1468.817001][ T1038] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.824424][ T1038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1468.845775][T16258] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.854025][T16258] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.861964][T16258] device bridge_slave_1 entered promiscuous mode [ 1468.874415][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1468.882952][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1468.891578][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1468.900297][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.907471][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1468.915470][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1468.924129][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1468.959158][T12761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1468.967978][T12761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1468.976427][T12761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1468.985914][T12761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1468.994510][T12761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1469.002921][T12761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1469.011691][T12761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1469.026682][T16250] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1469.074237][T16258] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1469.086036][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1469.094677][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1469.217036][T16258] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1469.229858][T16254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1469.246893][T16250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1469.261755][T16255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1469.303937][T16254] 8021q: adding VLAN 0 to HW filter on device team0 [ 1469.321022][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1469.329885][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1469.349428][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1469.368301][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1469.380837][T16258] team0: Port device team_slave_0 added [ 1469.389254][T16255] 8021q: adding VLAN 0 to HW filter on device team0 [ 1469.411816][T16258] team0: Port device team_slave_1 added [ 1469.430139][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1469.439698][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1469.450381][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1469.457487][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1469.469402][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1469.484855][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1469.493533][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1469.500806][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1469.508887][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1469.518130][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1469.566286][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1469.575438][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1469.588100][T10395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1469.595250][T10395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1469.610559][T16267] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1470.005027][T16258] device hsr_slave_0 entered promiscuous mode [ 1470.042917][T16258] device hsr_slave_1 entered promiscuous mode [ 1470.082543][T16258] debugfs: Directory 'hsr0' with parent '/' already present! [ 1470.090320][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1470.098372][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1470.107002][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1470.115500][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1470.122602][T10395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1470.130516][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1470.139176][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1470.147522][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1470.156185][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1470.164578][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1470.172978][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1470.181179][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1470.189566][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1470.197931][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1470.208845][T16254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1470.242424][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1470.251148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1470.273112][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1470.281490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1470.304130][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1470.311932][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1470.320945][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1470.346180][T16254] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1470.354623][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1470.366669][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1470.380521][T16255] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1470.393141][T16255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1470.405320][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1470.418926][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1470.466811][T16255] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1470.480400][T16258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1470.499520][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1470.508799][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1470.528625][T16258] 8021q: adding VLAN 0 to HW filter on device team0 [ 1470.566896][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1470.577392][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1470.586134][T12602] bridge0: port 1(bridge_slave_0) entered blocking state [ 1470.593245][T12602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1470.608267][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1470.640120][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1470.659060][T12602] bridge0: port 2(bridge_slave_1) entered blocking state [ 1470.666182][T12602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1470.674816][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1470.700698][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1470.710091][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1470.737662][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1470.770397][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1470.779717][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1470.794811][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1470.814512][T16283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1471.178214][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1471.186364][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1471.195224][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1471.204094][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1471.212841][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 12:20:37 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:37 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:37 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1471.227749][T16258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1471.330249][T16258] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1471.413373][T16289] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:20:37 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1471.456888][T16285] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:20:37 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:37 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:37 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1471.610003][T16294] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 12:20:37 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:37 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1472.316549][T16301] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:38 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1472.520168][T16306] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1472.532652][T16308] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 12:20:38 executing program 4: socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) 12:20:38 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1472.871544][T16311] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1473.354461][T16318] IPVS: ftp: loaded support on port[0] = 21 [ 1473.472801][T16318] chnl_net:caif_netlink_parms(): no params data found [ 1473.501146][T16318] bridge0: port 1(bridge_slave_0) entered blocking state [ 1473.508377][T16318] bridge0: port 1(bridge_slave_0) entered disabled state [ 1473.516458][T16318] device bridge_slave_0 entered promiscuous mode [ 1473.587257][T16318] bridge0: port 2(bridge_slave_1) entered blocking state [ 1473.597509][T16318] bridge0: port 2(bridge_slave_1) entered disabled state [ 1473.605128][T16318] device bridge_slave_1 entered promiscuous mode [ 1473.686240][T16318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1473.696636][T16318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1473.776722][T16318] team0: Port device team_slave_0 added [ 1473.785303][T16318] team0: Port device team_slave_1 added [ 1473.834659][T16318] device hsr_slave_0 entered promiscuous mode [ 1473.872680][T16318] device hsr_slave_1 entered promiscuous mode [ 1473.912478][T16318] debugfs: Directory 'hsr0' with parent '/' already present! [ 1473.928143][ T7] device bridge_slave_1 left promiscuous mode [ 1473.934493][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1473.973238][ T7] device bridge_slave_0 left promiscuous mode [ 1473.979394][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1474.033365][ T7] device bridge_slave_1 left promiscuous mode [ 1474.039482][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1474.083540][ T7] device bridge_slave_0 left promiscuous mode [ 1474.089759][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1475.602828][ T7] device hsr_slave_0 left promiscuous mode [ 1475.642498][ T7] device hsr_slave_1 left promiscuous mode [ 1475.697394][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1475.708438][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1475.718354][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1475.745475][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1475.804470][ T7] bond0 (unregistering): Released all slaves [ 1475.973084][ T7] device hsr_slave_0 left promiscuous mode [ 1476.012485][ T7] device hsr_slave_1 left promiscuous mode [ 1476.068675][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1476.079932][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1476.089747][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1476.155629][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1476.226244][ T7] bond0 (unregistering): Released all slaves [ 1476.332099][T16318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1476.348284][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1476.356878][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1476.366774][T16318] 8021q: adding VLAN 0 to HW filter on device team0 [ 1476.376405][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1476.384989][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1476.393578][T12763] bridge0: port 1(bridge_slave_0) entered blocking state [ 1476.400613][T12763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1476.408420][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1476.419715][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1476.428309][T12763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1476.437004][T12763] bridge0: port 2(bridge_slave_1) entered blocking state [ 1476.444101][T12763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1476.463565][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1476.472226][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1476.481111][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1476.489794][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1476.498628][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1476.510621][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1476.519112][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1476.533813][T16318] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1476.544840][T16318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1476.557191][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1476.565892][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1476.574361][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1476.583155][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1476.591470][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1476.678084][T16318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1476.847179][T16326] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:20:43 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:43 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:43 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:43 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:43 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:43 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1477.813263][T16331] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1477.839778][T16330] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:20:44 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:44 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:44 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:44 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1478.367709][T16334] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:44 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:44 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1479.154971][T16337] IPVS: ftp: loaded support on port[0] = 21 [ 1479.215639][T16337] chnl_net:caif_netlink_parms(): no params data found [ 1479.241787][T16337] bridge0: port 1(bridge_slave_0) entered blocking state [ 1479.248928][T16337] bridge0: port 1(bridge_slave_0) entered disabled state [ 1479.256727][T16337] device bridge_slave_0 entered promiscuous mode [ 1479.264556][T16337] bridge0: port 2(bridge_slave_1) entered blocking state [ 1479.271657][T16337] bridge0: port 2(bridge_slave_1) entered disabled state [ 1479.279259][T16337] device bridge_slave_1 entered promiscuous mode [ 1479.296713][T16337] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1479.307078][T16337] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1479.325111][T16337] team0: Port device team_slave_0 added [ 1479.331802][T16337] team0: Port device team_slave_1 added [ 1479.394768][T16337] device hsr_slave_0 entered promiscuous mode [ 1479.442760][T16337] device hsr_slave_1 entered promiscuous mode [ 1479.482423][T16337] debugfs: Directory 'hsr0' with parent '/' already present! [ 1479.948427][T16341] IPVS: ftp: loaded support on port[0] = 21 [ 1479.966825][T16342] IPVS: ftp: loaded support on port[0] = 21 [ 1480.249191][T16344] IPVS: ftp: loaded support on port[0] = 21 [ 1480.426150][T16346] IPVS: ftp: loaded support on port[0] = 21 [ 1480.634043][T16337] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1480.703292][T16341] chnl_net:caif_netlink_parms(): no params data found [ 1480.914111][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1480.921929][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1480.951822][T16337] 8021q: adding VLAN 0 to HW filter on device team0 [ 1481.181957][T16342] chnl_net:caif_netlink_parms(): no params data found [ 1481.201436][T16341] bridge0: port 1(bridge_slave_0) entered blocking state [ 1481.208681][T16341] bridge0: port 1(bridge_slave_0) entered disabled state [ 1481.216576][T16341] device bridge_slave_0 entered promiscuous mode [ 1481.224363][T16341] bridge0: port 2(bridge_slave_1) entered blocking state [ 1481.231521][T16341] bridge0: port 2(bridge_slave_1) entered disabled state [ 1481.239442][T16341] device bridge_slave_1 entered promiscuous mode [ 1481.278245][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1481.287292][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1481.295665][T10402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1481.302745][T10402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1481.310224][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1481.321343][T16346] chnl_net:caif_netlink_parms(): no params data found [ 1481.340439][T16342] bridge0: port 1(bridge_slave_0) entered blocking state [ 1481.347646][T16342] bridge0: port 1(bridge_slave_0) entered disabled state [ 1481.356019][T16342] device bridge_slave_0 entered promiscuous mode [ 1481.383805][T16341] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1481.397893][T16341] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1481.601341][T16342] bridge0: port 2(bridge_slave_1) entered blocking state [ 1481.608523][T16342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1481.616304][T16342] device bridge_slave_1 entered promiscuous mode [ 1481.650671][T16341] team0: Port device team_slave_0 added [ 1481.657846][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1481.666513][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1481.675309][T13234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1481.682386][T13234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1481.701471][T16344] chnl_net:caif_netlink_parms(): no params data found [ 1481.716616][T16341] team0: Port device team_slave_1 added [ 1481.918493][T16342] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1481.939436][T16346] bridge0: port 1(bridge_slave_0) entered blocking state [ 1481.947228][T16346] bridge0: port 1(bridge_slave_0) entered disabled state [ 1481.957499][T16346] device bridge_slave_0 entered promiscuous mode [ 1481.965809][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1481.974454][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1481.994087][T16342] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1482.027953][T16346] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.035238][T16346] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.042882][T16346] device bridge_slave_1 entered promiscuous mode [ 1482.094932][T16341] device hsr_slave_0 entered promiscuous mode [ 1482.133397][T16341] device hsr_slave_1 entered promiscuous mode [ 1482.172410][T16341] debugfs: Directory 'hsr0' with parent '/' already present! [ 1482.187029][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1482.195790][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1482.204177][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1482.218655][T16344] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.225996][T16344] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.234451][T16344] device bridge_slave_0 entered promiscuous mode [ 1482.249513][T16344] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.256716][T16344] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.264705][T16344] device bridge_slave_1 entered promiscuous mode [ 1482.273881][T16342] team0: Port device team_slave_0 added [ 1482.279661][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1482.288361][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1482.296931][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1482.305454][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1482.529681][T16346] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1482.540117][T16342] team0: Port device team_slave_1 added [ 1482.550098][T16337] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1482.561718][T16337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1482.570992][T16344] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1482.582018][T16344] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1482.593146][T16346] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1482.616776][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1482.625071][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1482.636916][ T7] device bridge_slave_1 left promiscuous mode [ 1482.644275][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.683680][ T7] device bridge_slave_0 left promiscuous mode [ 1482.689885][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.743391][ T7] device bridge_slave_1 left promiscuous mode [ 1482.749574][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.793362][ T7] device bridge_slave_0 left promiscuous mode [ 1482.799520][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.853449][ T7] device bridge_slave_1 left promiscuous mode [ 1482.859668][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.913074][ T7] device bridge_slave_0 left promiscuous mode [ 1482.919350][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.973773][ T7] device bridge_slave_1 left promiscuous mode [ 1482.980035][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.043173][ T7] device bridge_slave_0 left promiscuous mode [ 1483.049324][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.093696][ T7] device bridge_slave_1 left promiscuous mode [ 1483.099841][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.153023][ T7] device bridge_slave_0 left promiscuous mode [ 1483.159186][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.213600][ T7] device bridge_slave_1 left promiscuous mode [ 1483.219731][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.263107][ T7] device bridge_slave_0 left promiscuous mode [ 1483.269232][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.693280][ T7] device hsr_slave_0 left promiscuous mode [ 1487.732553][ T7] device hsr_slave_1 left promiscuous mode [ 1487.799710][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1487.810292][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1487.823535][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1487.857632][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1487.964538][ T7] bond0 (unregistering): Released all slaves [ 1488.093168][ T7] device hsr_slave_0 left promiscuous mode [ 1488.152510][ T7] device hsr_slave_1 left promiscuous mode [ 1488.199720][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1488.209421][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1488.218960][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1488.296021][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1488.356074][ T7] bond0 (unregistering): Released all slaves [ 1488.513069][ T7] device hsr_slave_0 left promiscuous mode [ 1488.563399][ T7] device hsr_slave_1 left promiscuous mode [ 1488.610125][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1488.620230][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1488.631110][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1488.695699][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1488.765517][ T7] bond0 (unregistering): Released all slaves [ 1488.913048][ T7] device hsr_slave_0 left promiscuous mode [ 1488.962488][ T7] device hsr_slave_1 left promiscuous mode [ 1489.028066][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1489.039174][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1489.049577][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1489.115908][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1489.173679][ T7] bond0 (unregistering): Released all slaves [ 1489.312962][ T7] device hsr_slave_0 left promiscuous mode [ 1489.352566][ T7] device hsr_slave_1 left promiscuous mode [ 1489.419654][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1489.429606][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1489.440772][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1489.485327][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1489.566722][ T7] bond0 (unregistering): Released all slaves [ 1489.702951][ T7] device hsr_slave_0 left promiscuous mode [ 1489.744730][ T7] device hsr_slave_1 left promiscuous mode [ 1489.791980][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1489.803478][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1489.813610][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1489.845098][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1489.928862][ T7] bond0 (unregistering): Released all slaves [ 1490.096707][T16342] device hsr_slave_0 entered promiscuous mode [ 1490.162552][T16342] device hsr_slave_1 entered promiscuous mode [ 1490.214283][T16337] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1490.222545][T16344] team0: Port device team_slave_0 added [ 1490.229226][T16346] team0: Port device team_slave_0 added [ 1490.238575][T16346] team0: Port device team_slave_1 added [ 1490.278961][T16344] team0: Port device team_slave_1 added [ 1490.384379][T16346] device hsr_slave_0 entered promiscuous mode [ 1490.422606][T16346] device hsr_slave_1 entered promiscuous mode [ 1490.462363][T16346] debugfs: Directory 'hsr0' with parent '/' already present! [ 1490.534493][T16344] device hsr_slave_0 entered promiscuous mode [ 1490.552708][T16344] device hsr_slave_1 entered promiscuous mode [ 1490.592356][T16344] debugfs: Directory 'hsr0' with parent '/' already present! [ 1490.619344][T16357] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1490.962410][T16342] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1490.987529][T16341] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1491.026180][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1491.035208][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1491.053657][T16342] 8021q: adding VLAN 0 to HW filter on device team0 [ 1491.087492][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1491.095436][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1491.108224][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1491.117884][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1491.130228][T12602] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.137335][T12602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1491.149554][T16341] 8021q: adding VLAN 0 to HW filter on device team0 [ 1491.164687][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1491.172896][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1491.181399][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1491.190003][ T1373] bridge0: port 2(bridge_slave_1) entered blocking state [ 1491.197119][ T1373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1491.205231][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1491.231199][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1491.239737][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1491.248339][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1491.256737][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1491.265426][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1491.274308][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1491.282764][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1491.291497][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1491.306978][T16342] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1491.318062][T16342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1491.328108][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1491.336872][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1491.345471][ T1373] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.352566][ T1373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1491.360235][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1491.368677][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1491.377309][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1491.388219][T16346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1491.401818][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1491.413344][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1491.421603][T13234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1491.428689][T13234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1491.446676][T16344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1491.465652][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1491.473561][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1491.481134][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1491.489876][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1491.499100][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1491.507600][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1491.516113][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1491.524878][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1491.533414][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1491.548271][T16346] 8021q: adding VLAN 0 to HW filter on device team0 [ 1491.565171][T16341] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1491.578428][T16341] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1491.590478][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1491.601037][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1491.609337][T10402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.616381][T10402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1491.624874][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1491.633163][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1491.641339][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1491.649556][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1491.669111][T16344] 8021q: adding VLAN 0 to HW filter on device team0 [ 1491.679652][T16342] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1491.687649][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1491.695879][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1491.708095][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1491.716895][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1491.726042][T10402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1491.733163][T10402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1491.740902][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1491.749871][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1491.757680][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1491.834514][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1491.846241][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1491.856686][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1491.866747][T10402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.873843][T10402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1491.881643][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1491.890742][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1491.899222][T10402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1491.906293][T10402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1491.914159][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1492.035214][T16341] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1492.122703][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1492.131397][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1492.140103][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1492.148436][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1492.157126][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1492.165906][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1492.174421][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1492.183279][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1492.191579][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1492.199634][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1492.214758][T16366] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1492.548509][T16344] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1492.559250][T16344] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1492.575790][T16346] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1492.587360][T16346] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1492.611629][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1492.626747][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1492.646249][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1492.660499][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1492.669522][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1492.678918][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1492.687804][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1492.696530][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1492.705396][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1492.714179][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1492.741885][T16344] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1492.765802][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1492.776864][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1492.842187][T16346] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1492.864462][T16370] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:20:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') 12:20:59 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:20:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffda1, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000000f0ff7f00"}, 0x17c) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0xc1) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) shutdown(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffec3) socket$inet_udplite(0x2, 0x2, 0x88) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xfffffee6) bpf$MAP_CREATE(0x4, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x100000125) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0xffffffffffffff6b) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffffffffffebb, 0x0, 0x0, 0x0) 12:20:59 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0xb, 0x60}}) [ 1493.469420][T16382] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1493.489896][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:20:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, 0x0) 12:21:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7a) 12:21:00 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x1000000000002, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = memfd_create(0x0, 0x0) getpeername$inet6(r0, 0x0, 0x0) 12:21:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(r0) [ 1494.653589][T16385] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:21:01 executing program 3: 12:21:01 executing program 5: 12:21:01 executing program 0: 12:21:01 executing program 2: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) 12:21:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(r0) [ 1495.508351][T16416] IPVS: ftp: loaded support on port[0] = 21 [ 1495.590436][T16416] chnl_net:caif_netlink_parms(): no params data found [ 1495.622287][T16416] bridge0: port 1(bridge_slave_0) entered blocking state [ 1495.629585][T16416] bridge0: port 1(bridge_slave_0) entered disabled state [ 1495.637302][T16416] device bridge_slave_0 entered promiscuous mode [ 1495.644748][T16416] bridge0: port 2(bridge_slave_1) entered blocking state [ 1495.651864][T16416] bridge0: port 2(bridge_slave_1) entered disabled state [ 1495.659635][T16416] device bridge_slave_1 entered promiscuous mode [ 1495.678231][T16416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1495.688899][T16416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1495.707299][T16416] team0: Port device team_slave_0 added [ 1495.714243][T16416] team0: Port device team_slave_1 added [ 1495.784999][T16416] device hsr_slave_0 entered promiscuous mode [ 1495.822713][T16416] device hsr_slave_1 entered promiscuous mode [ 1495.882421][T16416] debugfs: Directory 'hsr0' with parent '/' already present! [ 1496.113589][T16416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1496.215149][T16416] 8021q: adding VLAN 0 to HW filter on device team0 [ 1496.222519][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1496.230027][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1496.239672][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1496.249632][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1496.258205][T13290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1496.265281][T13290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1496.273419][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1496.293178][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1496.301746][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1496.310717][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1496.317795][T10395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1496.325593][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1496.334373][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1496.343084][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1496.351595][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1496.360331][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1496.368782][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1496.377197][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1496.385496][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1496.394201][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1496.501359][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1496.510205][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1496.520712][T16416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1496.635282][T16416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1496.908080][T16424] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:03 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:03 executing program 5: 12:21:03 executing program 0: 12:21:03 executing program 3: 12:21:03 executing program 2: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) 12:21:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(r0) 12:21:03 executing program 0: 12:21:03 executing program 0: 12:21:03 executing program 0: 12:21:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(r0) 12:21:03 executing program 0: 12:21:03 executing program 0: 12:21:04 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1498.144363][ T7] device bridge_slave_1 left promiscuous mode [ 1498.150581][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1498.196116][ T7] device bridge_slave_0 left promiscuous mode [ 1498.203614][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1498.256230][ T7] device bridge_slave_1 left promiscuous mode [ 1498.264707][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1498.353024][ T7] device bridge_slave_0 left promiscuous mode [ 1498.359236][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1498.433236][ T7] device bridge_slave_1 left promiscuous mode [ 1498.439360][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1498.503125][ T7] device bridge_slave_0 left promiscuous mode [ 1498.509269][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1500.583063][ T7] device hsr_slave_0 left promiscuous mode [ 1500.622418][ T7] device hsr_slave_1 left promiscuous mode [ 1500.688504][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1500.698746][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1500.709915][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1500.735944][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1500.805867][ T7] bond0 (unregistering): Released all slaves [ 1500.982798][ T7] device hsr_slave_0 left promiscuous mode [ 1501.022371][ T7] device hsr_slave_1 left promiscuous mode [ 1501.088681][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1501.099671][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1501.110141][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1501.155012][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1501.232211][ T7] bond0 (unregistering): Released all slaves [ 1501.433000][ T7] device hsr_slave_0 left promiscuous mode [ 1501.492435][ T7] device hsr_slave_1 left promiscuous mode [ 1501.568732][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1501.578384][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1501.589063][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1501.646313][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1501.724055][ T7] bond0 (unregistering): Released all slaves [ 1501.844700][T16440] IPVS: ftp: loaded support on port[0] = 21 [ 1501.844868][T16443] IPVS: ftp: loaded support on port[0] = 21 [ 1501.870622][T16444] IPVS: ftp: loaded support on port[0] = 21 [ 1502.010453][T16440] chnl_net:caif_netlink_parms(): no params data found [ 1502.019133][T16443] chnl_net:caif_netlink_parms(): no params data found [ 1502.096652][T16444] chnl_net:caif_netlink_parms(): no params data found [ 1502.115589][T16440] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.123359][T16440] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.131050][T16440] device bridge_slave_0 entered promiscuous mode [ 1502.139061][T16440] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.146284][T16440] bridge0: port 2(bridge_slave_1) entered disabled state [ 1502.154713][T16440] device bridge_slave_1 entered promiscuous mode [ 1502.173109][T16443] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.180301][T16443] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.188356][T16443] device bridge_slave_0 entered promiscuous mode [ 1502.205904][T16443] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.213724][T16443] bridge0: port 2(bridge_slave_1) entered disabled state [ 1502.221299][T16443] device bridge_slave_1 entered promiscuous mode [ 1502.235938][T16440] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1502.256470][T16440] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1502.286223][T16440] team0: Port device team_slave_0 added [ 1502.292115][T16444] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.301178][T16444] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.308775][T16444] device bridge_slave_0 entered promiscuous mode [ 1502.317691][T16444] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.324867][T16444] bridge0: port 2(bridge_slave_1) entered disabled state [ 1502.332887][T16444] device bridge_slave_1 entered promiscuous mode [ 1502.341265][T16443] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1502.351159][T16440] team0: Port device team_slave_1 added [ 1502.362039][T16443] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1502.384056][T16444] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1502.454313][T16440] device hsr_slave_0 entered promiscuous mode [ 1502.492541][T16440] device hsr_slave_1 entered promiscuous mode [ 1502.532383][T16440] debugfs: Directory 'hsr0' with parent '/' already present! [ 1502.545628][T16444] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1502.567377][T16444] team0: Port device team_slave_0 added [ 1502.574953][T16443] team0: Port device team_slave_0 added [ 1502.582026][T16443] team0: Port device team_slave_1 added [ 1502.588923][T16444] team0: Port device team_slave_1 added [ 1502.656087][T16444] device hsr_slave_0 entered promiscuous mode [ 1502.692830][T16444] device hsr_slave_1 entered promiscuous mode [ 1502.732400][T16444] debugfs: Directory 'hsr0' with parent '/' already present! [ 1502.795960][T16443] device hsr_slave_0 entered promiscuous mode [ 1502.834637][T16443] device hsr_slave_1 entered promiscuous mode [ 1502.892529][T16443] debugfs: Directory 'hsr0' with parent '/' already present! [ 1502.901914][T16440] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.909060][T16440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1502.916431][T16440] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.923519][T16440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1502.934539][T13290] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.942122][T13290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1503.163853][T16440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1503.180847][T16444] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1503.201827][T16440] 8021q: adding VLAN 0 to HW filter on device team0 [ 1503.213159][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1503.221015][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1503.238049][T16444] 8021q: adding VLAN 0 to HW filter on device team0 [ 1503.253117][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1503.261354][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1503.272530][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1503.281053][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1503.289812][ T1766] bridge0: port 1(bridge_slave_0) entered blocking state [ 1503.296913][ T1766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1503.304765][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1503.315890][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1503.324397][ T1766] bridge0: port 2(bridge_slave_1) entered blocking state [ 1503.331455][ T1766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1503.343802][T16443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1503.376723][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1503.385949][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1503.397796][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1503.407000][ T1766] bridge0: port 1(bridge_slave_0) entered blocking state [ 1503.414121][ T1766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1503.425034][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1503.434557][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1503.443475][ T1766] bridge0: port 2(bridge_slave_1) entered blocking state [ 1503.450529][ T1766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1503.458808][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1503.467740][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1503.489262][T16444] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1503.500042][T16444] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1503.517187][T16443] 8021q: adding VLAN 0 to HW filter on device team0 [ 1503.532728][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1503.540691][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1503.550530][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1503.563970][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1503.575484][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1503.584637][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1503.593431][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1503.601546][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1503.609860][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1503.618189][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1503.626346][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1503.634124][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1503.641633][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1503.650105][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1503.658777][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1503.666895][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1503.674591][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1503.706733][T16444] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1503.727252][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1503.736956][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1503.748286][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1503.756831][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1503.765478][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1503.774156][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1503.782494][ T1766] bridge0: port 1(bridge_slave_0) entered blocking state [ 1503.789545][ T1766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1503.797034][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1503.805692][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1503.813928][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1503.822867][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1503.831161][ T1766] bridge0: port 2(bridge_slave_1) entered blocking state [ 1503.838232][ T1766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1503.846051][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1503.854714][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1503.863328][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1503.871652][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1503.880868][T16440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1503.896813][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1503.907428][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1503.915968][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1503.931069][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1503.939685][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1503.948078][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1503.960539][T16443] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1503.990340][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1504.006293][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1504.035271][T16440] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1504.080485][T16443] 8021q: adding VLAN 0 to HW filter on device batadv0 12:21:10 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000050000000000000001800000000000000", @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYBLOB="852a62739a5500000000000000000000000000000000ff00852a6277"], @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000018"]], 0x0, 0x0, 0x0}) 12:21:10 executing program 0: 12:21:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) 12:21:10 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:10 executing program 2: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) 12:21:10 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r0, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2", 0x3f) sendfile(r0, r0, &(0x7f0000002580), 0x7fffffff) sendfile(r0, r0, 0x0, 0x8000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 12:21:10 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7be, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1504.521160][T16478] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.0 proc:/self/fd/3' not defined. [ 1504.554870][T16479] debugfs: File '16476' in directory 'proc' already present! 12:21:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) [ 1504.612347][T16479] debugfs: File '16476' in directory 'proc' already present! 12:21:10 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="11634840000000000000000000000000000000000000000000000000000000000000000050000000000000001800000000000000", @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYBLOB="852a62739a5500000000000000000000000000000000ff00852a6277"], @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000018"]], 0x0, 0x0, 0x0}) 12:21:11 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) creat(&(0x7f00000000c0)='./file0/file1\x00', 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(r0, &(0x7f00000020c0), 0xf18) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) 12:21:11 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1504.897607][T16494] debugfs: File '16493' in directory 'proc' already present! 12:21:11 executing program 5: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x7fffffc) fcntl$setpipe(r0, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), 0x0) getpid() gettid() stat(0x0, 0x0) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) 12:21:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) 12:21:11 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:11 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1505.439914][T16511] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1506.766956][T16516] IPVS: ftp: loaded support on port[0] = 21 [ 1506.884436][T16516] chnl_net:caif_netlink_parms(): no params data found [ 1506.910759][T16516] bridge0: port 1(bridge_slave_0) entered blocking state [ 1506.918118][T16516] bridge0: port 1(bridge_slave_0) entered disabled state [ 1506.925874][T16516] device bridge_slave_0 entered promiscuous mode [ 1506.996426][T16516] bridge0: port 2(bridge_slave_1) entered blocking state [ 1507.003540][T16516] bridge0: port 2(bridge_slave_1) entered disabled state [ 1507.011108][T16516] device bridge_slave_1 entered promiscuous mode [ 1507.090382][T16516] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1507.102484][T16516] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1507.123000][T16516] team0: Port device team_slave_0 added [ 1507.129497][T16516] team0: Port device team_slave_1 added [ 1507.244211][T16516] device hsr_slave_0 entered promiscuous mode [ 1507.282584][T16516] device hsr_slave_1 entered promiscuous mode [ 1507.322358][T16516] debugfs: Directory 'hsr0' with parent '/' already present! [ 1507.331026][ T7] device bridge_slave_1 left promiscuous mode [ 1507.337334][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1507.393172][ T7] device bridge_slave_0 left promiscuous mode [ 1507.399417][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1507.473836][ T7] device bridge_slave_1 left promiscuous mode [ 1507.480110][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1507.522883][ T7] device bridge_slave_0 left promiscuous mode [ 1507.529014][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1509.102953][ T7] device hsr_slave_0 left promiscuous mode [ 1509.142434][ T7] device hsr_slave_1 left promiscuous mode [ 1509.187957][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1509.199187][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1509.209250][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1509.246053][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1509.326037][ T7] bond0 (unregistering): Released all slaves [ 1509.462869][ T7] device hsr_slave_0 left promiscuous mode [ 1509.512839][ T7] device hsr_slave_1 left promiscuous mode [ 1509.558945][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1509.570088][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1509.579917][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1509.616579][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1509.685862][ T7] bond0 (unregistering): Released all slaves [ 1509.796799][T16519] IPVS: ftp: loaded support on port[0] = 21 [ 1509.886620][T16516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1509.900145][T16519] chnl_net:caif_netlink_parms(): no params data found [ 1509.938799][T16516] 8021q: adding VLAN 0 to HW filter on device team0 [ 1509.945727][T16519] bridge0: port 1(bridge_slave_0) entered blocking state [ 1509.953173][T16519] bridge0: port 1(bridge_slave_0) entered disabled state [ 1509.960901][T16519] device bridge_slave_0 entered promiscuous mode [ 1509.968180][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1509.977600][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1509.989670][T16519] bridge0: port 2(bridge_slave_1) entered blocking state [ 1509.997510][T16519] bridge0: port 2(bridge_slave_1) entered disabled state [ 1510.005646][T16519] device bridge_slave_1 entered promiscuous mode [ 1510.018656][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1510.028221][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1510.036752][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1510.043832][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1510.051417][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1510.059977][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1510.068257][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1510.075334][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1510.083267][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1510.108826][T16519] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1510.118272][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1510.127266][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1510.136302][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1510.145102][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1510.153930][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1510.162608][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1510.170994][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1510.179591][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1510.187960][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1510.196412][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1510.205020][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1510.264723][T16519] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1510.332357][T16516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1510.358230][T16519] team0: Port device team_slave_0 added [ 1510.376597][T16516] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1510.388643][T16519] team0: Port device team_slave_1 added [ 1510.475236][T16519] device hsr_slave_0 entered promiscuous mode [ 1510.542680][T16519] device hsr_slave_1 entered promiscuous mode [ 1510.592370][T16519] debugfs: Directory 'hsr0' with parent '/' already present! [ 1510.621070][T16519] bridge0: port 2(bridge_slave_1) entered blocking state [ 1510.628163][T16519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1510.635519][T16519] bridge0: port 1(bridge_slave_0) entered blocking state [ 1510.642600][T16519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1510.707834][T16519] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1510.725365][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1510.735084][T10402] bridge0: port 1(bridge_slave_0) entered disabled state [ 1510.744528][T10402] bridge0: port 2(bridge_slave_1) entered disabled state [ 1510.757832][T16519] 8021q: adding VLAN 0 to HW filter on device team0 [ 1510.770571][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1510.780926][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1510.788013][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1510.817299][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1510.826098][T10402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1510.833181][T10402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1510.846541][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1510.856659][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1510.868327][T16527] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1511.207720][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1511.219814][T16519] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1511.230498][T16519] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1511.241860][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1511.250360][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 12:21:17 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:17 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(0xffffffffffffffff) 12:21:17 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:17 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1511.259010][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1511.267366][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1511.276224][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1511.335179][T16519] 8021q: adding VLAN 0 to HW filter on device batadv0 12:21:17 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(0xffffffffffffffff) [ 1511.405464][T16531] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1511.453162][T16536] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:21:17 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:17 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(0xffffffffffffffff) 12:21:17 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(r0) 12:21:18 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(r0) [ 1512.064827][T16542] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1512.207091][T16556] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:21:19 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:19 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:19 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:19 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:19 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:19 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(r0) [ 1513.240035][T16562] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1513.511174][T16565] IPVS: ftp: loaded support on port[0] = 21 [ 1513.825653][T16565] chnl_net:caif_netlink_parms(): no params data found [ 1513.988475][T16565] bridge0: port 1(bridge_slave_0) entered blocking state [ 1513.999661][T16565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1514.007784][T16565] device bridge_slave_0 entered promiscuous mode [ 1514.108432][T16565] bridge0: port 2(bridge_slave_1) entered blocking state [ 1514.115976][T16565] bridge0: port 2(bridge_slave_1) entered disabled state [ 1514.124398][T16565] device bridge_slave_1 entered promiscuous mode [ 1514.151465][T16565] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1514.245964][T16565] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1514.265440][T16565] team0: Port device team_slave_0 added [ 1514.272101][T16565] team0: Port device team_slave_1 added [ 1514.334220][T16565] device hsr_slave_0 entered promiscuous mode [ 1514.372600][T16565] device hsr_slave_1 entered promiscuous mode [ 1514.412361][T16565] debugfs: Directory 'hsr0' with parent '/' already present! [ 1514.508930][T16565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1514.519996][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1514.527796][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1514.539322][T16565] 8021q: adding VLAN 0 to HW filter on device team0 [ 1514.546806][ T7] device bridge_slave_1 left promiscuous mode [ 1514.560587][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1514.613165][ T7] device bridge_slave_0 left promiscuous mode [ 1514.619372][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1514.673344][ T7] device bridge_slave_1 left promiscuous mode [ 1514.679501][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1514.733294][ T7] device bridge_slave_0 left promiscuous mode [ 1514.739476][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1516.162877][ T7] device hsr_slave_0 left promiscuous mode [ 1516.233364][ T7] device hsr_slave_1 left promiscuous mode [ 1516.288624][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1516.299180][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1516.309791][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1516.355525][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1516.426862][ T7] bond0 (unregistering): Released all slaves [ 1516.562802][ T7] device hsr_slave_0 left promiscuous mode [ 1516.602467][ T7] device hsr_slave_1 left promiscuous mode [ 1516.650338][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1516.661407][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1516.673168][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1516.696660][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1516.783748][ T7] bond0 (unregistering): Released all slaves [ 1516.885285][T16568] IPVS: ftp: loaded support on port[0] = 21 [ 1516.885391][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1516.900702][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1516.909192][T10402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1516.916365][T10402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1516.924189][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1516.932716][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1516.940948][T10402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1516.948030][T10402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1516.955875][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1516.964715][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1516.981149][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1516.989933][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1516.998643][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1517.008058][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1517.039306][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1517.049106][T16570] IPVS: ftp: loaded support on port[0] = 21 [ 1517.056439][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1517.064868][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1517.073204][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1517.090934][T16565] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1517.102816][T16565] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1517.117296][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1517.126652][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1517.191183][T16565] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1517.205751][T16568] chnl_net:caif_netlink_parms(): no params data found [ 1517.287848][T16568] bridge0: port 1(bridge_slave_0) entered blocking state [ 1517.298224][T16568] bridge0: port 1(bridge_slave_0) entered disabled state [ 1517.307715][T16568] device bridge_slave_0 entered promiscuous mode [ 1517.336992][T16570] chnl_net:caif_netlink_parms(): no params data found [ 1517.347968][T16568] bridge0: port 2(bridge_slave_1) entered blocking state [ 1517.355151][T16568] bridge0: port 2(bridge_slave_1) entered disabled state [ 1517.363173][T16568] device bridge_slave_1 entered promiscuous mode [ 1517.403408][T16570] bridge0: port 1(bridge_slave_0) entered blocking state [ 1517.410536][T16570] bridge0: port 1(bridge_slave_0) entered disabled state [ 1517.418706][T16570] device bridge_slave_0 entered promiscuous mode [ 1517.427918][T16568] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1517.443555][T16568] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1517.543085][T16570] bridge0: port 2(bridge_slave_1) entered blocking state [ 1517.550206][T16570] bridge0: port 2(bridge_slave_1) entered disabled state [ 1517.561684][T16570] device bridge_slave_1 entered promiscuous mode [ 1517.597138][T16579] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1518.138783][T16568] team0: Port device team_slave_0 added [ 1518.161706][T16570] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1518.174964][T16568] team0: Port device team_slave_1 added 12:21:24 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) close(r0) 12:21:24 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:24 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1518.182914][T16570] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 12:21:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) close(r0) [ 1518.250897][T16570] team0: Port device team_slave_0 added [ 1518.317277][T16568] device hsr_slave_0 entered promiscuous mode [ 1518.353190][T16568] device hsr_slave_1 entered promiscuous mode 12:21:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) close(r0) [ 1518.392713][T16568] debugfs: Directory 'hsr0' with parent '/' already present! [ 1518.406362][T16570] team0: Port device team_slave_1 added [ 1518.415770][T16583] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1518.905176][T16570] device hsr_slave_0 entered promiscuous mode [ 1518.922584][T16570] device hsr_slave_1 entered promiscuous mode [ 1518.972383][T16570] debugfs: Directory 'hsr0' with parent '/' already present! [ 1519.169296][T16568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1519.189263][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1519.198383][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1519.214080][T16568] 8021q: adding VLAN 0 to HW filter on device team0 [ 1519.228449][T16570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1519.246257][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1519.255357][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1519.263928][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1519.270990][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1519.279953][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1519.289308][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1519.297614][ T1481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1519.304677][ T1481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1519.312125][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1519.321481][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1519.337159][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1519.346100][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1519.355256][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1519.363709][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1519.372121][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1519.381157][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1519.393807][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1519.402098][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1519.413905][T16568] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1519.427820][T16568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1519.437580][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1519.445952][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1519.454419][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1519.462093][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1519.474828][T16570] 8021q: adding VLAN 0 to HW filter on device team0 [ 1519.488756][T16568] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1519.501282][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1519.510460][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1519.519219][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1519.526318][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1519.535355][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1519.545364][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1519.556857][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1519.566070][T13234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1519.573156][T13234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1519.886636][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1519.896249][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1519.907403][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1519.917089][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1519.926274][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1519.937812][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1519.950771][T16597] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1520.419259][T16570] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1520.429827][T16570] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1520.445542][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1520.453643][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1520.461826][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 12:21:26 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1520.471138][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1520.479970][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1520.488624][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1520.766928][T16570] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1520.780776][T16601] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1520.868490][T16599] IPVS: ftp: loaded support on port[0] = 21 [ 1521.548784][T16599] chnl_net:caif_netlink_parms(): no params data found [ 1521.561490][T16610] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:21:28 executing program 0: 12:21:28 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(0xffffffffffffffff) 12:21:28 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:28 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1522.028347][T16599] bridge0: port 1(bridge_slave_0) entered blocking state [ 1522.037601][T16599] bridge0: port 1(bridge_slave_0) entered disabled state [ 1522.045757][T16599] device bridge_slave_0 entered promiscuous mode 12:21:28 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(0xffffffffffffffff) 12:21:28 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1522.501159][T16599] bridge0: port 2(bridge_slave_1) entered blocking state [ 1522.512491][T16599] bridge0: port 2(bridge_slave_1) entered disabled state [ 1522.520396][T16599] device bridge_slave_1 entered promiscuous mode [ 1522.531991][T16614] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1522.927957][T16624] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1522.942244][T16619] IPVS: ftp: loaded support on port[0] = 21 [ 1522.959796][T16599] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1522.975382][ T7] device bridge_slave_1 left promiscuous mode [ 1522.981555][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1523.023511][ T7] device bridge_slave_0 left promiscuous mode [ 1523.029716][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1523.073939][ T7] device bridge_slave_1 left promiscuous mode [ 1523.080091][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1523.122993][ T7] device bridge_slave_0 left promiscuous mode [ 1523.129221][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1523.173686][ T7] device bridge_slave_1 left promiscuous mode [ 1523.179814][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1523.222965][ T7] device bridge_slave_0 left promiscuous mode [ 1523.229091][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1523.275869][ T7] device bridge_slave_1 left promiscuous mode [ 1523.281987][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1523.322933][ T7] device bridge_slave_0 left promiscuous mode [ 1523.329162][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1526.052788][ T7] device hsr_slave_0 left promiscuous mode [ 1526.122383][ T7] device hsr_slave_1 left promiscuous mode [ 1526.198532][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1526.209149][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1526.219422][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1526.276878][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1526.353827][ T7] bond0 (unregistering): Released all slaves [ 1526.492953][ T7] device hsr_slave_0 left promiscuous mode [ 1526.542437][ T7] device hsr_slave_1 left promiscuous mode [ 1526.599371][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1526.609925][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1526.621453][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1526.656123][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1526.724637][ T7] bond0 (unregistering): Released all slaves [ 1526.873050][ T7] device hsr_slave_0 left promiscuous mode [ 1526.942480][ T7] device hsr_slave_1 left promiscuous mode [ 1527.007919][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1527.018461][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1527.028174][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1527.067249][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1527.144465][ T7] bond0 (unregistering): Released all slaves [ 1527.292906][ T7] device hsr_slave_0 left promiscuous mode [ 1527.352416][ T7] device hsr_slave_1 left promiscuous mode [ 1527.397775][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1527.408640][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1527.418441][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1527.455522][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1527.532207][ T7] bond0 (unregistering): Released all slaves [ 1527.615615][T16599] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1527.726625][T16599] team0: Port device team_slave_0 added [ 1527.727709][T16627] IPVS: ftp: loaded support on port[0] = 21 [ 1527.748468][T16599] team0: Port device team_slave_1 added [ 1527.854323][T16599] device hsr_slave_0 entered promiscuous mode [ 1527.902679][T16599] device hsr_slave_1 entered promiscuous mode [ 1528.042066][T16619] chnl_net:caif_netlink_parms(): no params data found [ 1528.069806][T16627] chnl_net:caif_netlink_parms(): no params data found [ 1528.154148][T16619] bridge0: port 1(bridge_slave_0) entered blocking state [ 1528.161318][T16619] bridge0: port 1(bridge_slave_0) entered disabled state [ 1528.169133][T16619] device bridge_slave_0 entered promiscuous mode [ 1528.176975][T16619] bridge0: port 2(bridge_slave_1) entered blocking state [ 1528.184115][T16619] bridge0: port 2(bridge_slave_1) entered disabled state [ 1528.191710][T16619] device bridge_slave_1 entered promiscuous mode [ 1528.316123][T16619] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1528.368227][T16599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1528.380195][T16619] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1528.389597][T16627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1528.399822][T16627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1528.407788][T16627] device bridge_slave_0 entered promiscuous mode [ 1528.431914][T16627] bridge0: port 2(bridge_slave_1) entered blocking state [ 1528.442251][T16627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1528.450600][T16627] device bridge_slave_1 entered promiscuous mode [ 1528.467253][T16599] 8021q: adding VLAN 0 to HW filter on device team0 [ 1528.478854][T16619] team0: Port device team_slave_0 added [ 1528.487609][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1528.498664][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1528.513787][T16619] team0: Port device team_slave_1 added [ 1528.539973][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1528.552501][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1528.561026][T13291] bridge0: port 1(bridge_slave_0) entered blocking state [ 1528.568129][T13291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1528.584657][T16627] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1528.618199][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1528.627278][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1528.640027][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1528.649246][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1528.656348][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1528.667823][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1528.677751][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1528.690133][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1528.700556][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1528.713254][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1528.774878][T16619] device hsr_slave_0 entered promiscuous mode [ 1528.812693][T16619] device hsr_slave_1 entered promiscuous mode [ 1528.872751][T16619] debugfs: Directory 'hsr0' with parent '/' already present! [ 1528.881757][T16627] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1528.895891][T16599] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1528.906432][T16599] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1528.919322][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1528.927169][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1528.935442][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1528.943763][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1528.981527][T16599] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1529.007340][T16627] team0: Port device team_slave_0 added [ 1529.014992][T16627] team0: Port device team_slave_1 added [ 1529.061750][T16619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1529.115331][T16627] device hsr_slave_0 entered promiscuous mode [ 1529.152620][T16627] device hsr_slave_1 entered promiscuous mode [ 1529.192511][T16627] debugfs: Directory 'hsr0' with parent '/' already present! [ 1529.206456][T16619] 8021q: adding VLAN 0 to HW filter on device team0 [ 1529.238475][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1529.250821][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1529.301444][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1529.310718][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1529.323879][T13234] bridge0: port 1(bridge_slave_0) entered blocking state [ 1529.330937][T13234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1529.341910][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1529.350860][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1529.362543][T13234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1529.369599][T13234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1529.380601][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1529.389668][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1529.421604][T16636] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1529.748909][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1529.756968][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1529.765665][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1529.774128][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 12:21:35 executing program 3: 12:21:35 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom, @netrom, @rose, @rose]}, 0x48) close(0xffffffffffffffff) 12:21:35 executing program 0: 12:21:35 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1529.810321][T16627] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1529.827153][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1529.837890][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1529.866510][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1529.879245][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1529.909148][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1529.921571][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1529.938054][T16627] 8021q: adding VLAN 0 to HW filter on device team0 12:21:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xf, 0x4, &(0x7f00000033c0)=ANY=[@ANYBLOB="1800000000000000000000000800000061120000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1529.958620][T16619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1529.993513][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1530.001185][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1530.062817][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1530.071485][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1530.105508][T10402] bridge0: port 1(bridge_slave_0) entered blocking state [ 1530.112626][T10402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1530.128196][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1530.146724][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1530.180926][T10402] bridge0: port 2(bridge_slave_1) entered blocking state [ 1530.188030][T10402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1530.222621][T10402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1530.269602][T16619] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1530.293221][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1530.301134][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1530.310670][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1530.336923][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1530.374052][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1530.392823][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1530.401324][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1530.422886][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1530.438356][T16627] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1530.463819][T16627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1530.794190][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1530.801860][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1530.822837][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1531.091408][T16627] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1531.106056][T16653] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:21:37 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8800000000000001, 0x8010000000000084) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0]}, 0x7}, 0x1c) 12:21:37 executing program 4: syz_emit_ethernet(0x300036, &(0x7f0000000000)={@local, @empty=[0x3], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300002, 0x32, 0x0, @ipv4={[0x300002], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 1531.806028][T16663] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1532.124032][T16668] IPVS: ftp: loaded support on port[0] = 21 12:21:38 executing program 5: 12:21:38 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:38 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:38 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:38 executing program 3: 12:21:38 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) [ 1532.962161][T16674] IPVS: ftp: loaded support on port[0] = 21 [ 1533.156706][T16668] chnl_net:caif_netlink_parms(): no params data found [ 1533.203653][T16668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1533.210788][T16668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1533.218719][T16668] device bridge_slave_0 entered promiscuous mode [ 1533.229054][ T26] device bridge_slave_1 left promiscuous mode [ 1533.237218][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1533.293409][ T26] device bridge_slave_0 left promiscuous mode [ 1533.299707][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1533.353758][ T26] device bridge_slave_1 left promiscuous mode [ 1533.359989][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1533.402971][ T26] device bridge_slave_0 left promiscuous mode [ 1533.409195][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.042735][ T26] device hsr_slave_0 left promiscuous mode [ 1535.082369][ T26] device hsr_slave_1 left promiscuous mode [ 1535.127580][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1535.138549][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1535.148853][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1535.215119][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1535.278461][ T26] bond0 (unregistering): Released all slaves [ 1535.442987][ T26] device hsr_slave_0 left promiscuous mode [ 1535.502576][ T26] device hsr_slave_1 left promiscuous mode [ 1535.549086][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1535.559587][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1535.574806][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1535.606405][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1535.673930][ T26] bond0 (unregistering): Released all slaves [ 1535.774518][T16668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.781581][T16668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.789125][T16668] device bridge_slave_1 entered promiscuous mode [ 1535.808007][T16668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1535.822857][T16687] IPVS: ftp: loaded support on port[0] = 21 [ 1535.837263][T16668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1535.889721][T16668] team0: Port device team_slave_0 added [ 1535.900168][T16668] team0: Port device team_slave_1 added [ 1535.908473][T16674] chnl_net:caif_netlink_parms(): no params data found [ 1535.974238][T16668] device hsr_slave_0 entered promiscuous mode [ 1536.012622][T16668] device hsr_slave_1 entered promiscuous mode [ 1536.072637][T16668] debugfs: Directory 'hsr0' with parent '/' already present! [ 1536.121856][T16674] bridge0: port 1(bridge_slave_0) entered blocking state [ 1536.129033][T16674] bridge0: port 1(bridge_slave_0) entered disabled state [ 1536.136862][T16674] device bridge_slave_0 entered promiscuous mode [ 1536.144883][T16674] bridge0: port 2(bridge_slave_1) entered blocking state [ 1536.151934][T16674] bridge0: port 2(bridge_slave_1) entered disabled state [ 1536.159992][T16674] device bridge_slave_1 entered promiscuous mode [ 1536.215884][T16674] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1536.228111][T16674] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1536.237413][T16687] chnl_net:caif_netlink_parms(): no params data found [ 1536.324893][T16674] team0: Port device team_slave_0 added [ 1536.330680][T16687] bridge0: port 1(bridge_slave_0) entered blocking state [ 1536.338144][T16687] bridge0: port 1(bridge_slave_0) entered disabled state [ 1536.345777][T16687] device bridge_slave_0 entered promiscuous mode [ 1536.414701][T16674] team0: Port device team_slave_1 added [ 1536.421036][T16687] bridge0: port 2(bridge_slave_1) entered blocking state [ 1536.428442][T16687] bridge0: port 2(bridge_slave_1) entered disabled state [ 1536.440684][T16687] device bridge_slave_1 entered promiscuous mode [ 1536.481630][T16668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1536.534735][T16674] device hsr_slave_0 entered promiscuous mode [ 1536.595801][T16674] device hsr_slave_1 entered promiscuous mode [ 1536.642343][T16674] debugfs: Directory 'hsr0' with parent '/' already present! [ 1536.652114][T16687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1536.675242][T16687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1536.692754][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1536.700526][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1536.716019][T16668] 8021q: adding VLAN 0 to HW filter on device team0 [ 1536.755321][T16687] team0: Port device team_slave_0 added [ 1536.762868][T16687] team0: Port device team_slave_1 added [ 1536.773379][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1536.782623][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1536.791022][T13290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1536.798097][T13290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1536.806188][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1536.816262][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1536.824809][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1536.833164][T13290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1536.840225][T13290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1536.859843][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1536.926121][T16687] device hsr_slave_0 entered promiscuous mode [ 1536.975819][T16687] device hsr_slave_1 entered promiscuous mode [ 1537.052368][T16687] debugfs: Directory 'hsr0' with parent '/' already present! [ 1537.060490][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1537.087625][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1537.096218][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1537.104962][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1537.113824][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1537.122224][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1537.131184][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1537.142004][T16668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1537.153853][T16668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1537.163094][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1537.170990][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1537.179461][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1537.200770][T16674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1537.234110][T16668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1537.250299][T16674] 8021q: adding VLAN 0 to HW filter on device team0 [ 1537.261048][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1537.269280][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1537.277098][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1537.285799][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1537.294511][T13234] bridge0: port 1(bridge_slave_0) entered blocking state [ 1537.301566][T13234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1537.309764][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1537.329280][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1537.345456][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1537.354446][T12603] bridge0: port 2(bridge_slave_1) entered blocking state [ 1537.361493][T12603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1537.377362][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1537.386085][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1537.406855][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1537.427399][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1537.438140][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1537.457579][T16674] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1537.471450][T16674] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1537.629121][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1537.637766][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1537.646474][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1537.655111][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1537.663511][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1537.671694][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1537.680100][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1537.690781][T16696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1537.975137][T16687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1538.061145][T16674] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1538.076351][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1538.085086][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1538.095845][T16687] 8021q: adding VLAN 0 to HW filter on device team0 [ 1538.193869][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1538.205199][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1538.213586][T13234] bridge0: port 1(bridge_slave_0) entered blocking state [ 1538.220635][T13234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1538.228724][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1538.348580][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1538.357395][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1538.365902][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1538.372999][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1538.381048][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1538.390209][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 12:21:44 executing program 0: 12:21:44 executing program 3: 12:21:44 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:44 executing program 5: 12:21:44 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1538.399192][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1538.407890][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1538.417192][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1538.428485][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1538.437393][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 12:21:44 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1538.457379][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1538.469332][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 12:21:44 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:44 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1538.825208][T16687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1538.879315][T16687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1538.917625][T16708] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1538.936776][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1538.959477][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1539.142251][T16713] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1539.648821][T16687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1539.901193][T16721] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:21:46 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:46 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:46 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:46 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:46 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1540.293545][ T26] device bridge_slave_1 left promiscuous mode [ 1540.299762][ T26] bridge0: port 2(bridge_slave_1) entered disabled state 12:21:46 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) [ 1540.373156][ T26] device bridge_slave_0 left promiscuous mode [ 1540.379354][ T26] bridge0: port 1(bridge_slave_0) entered disabled state 12:21:46 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) [ 1540.484656][ T26] device bridge_slave_1 left promiscuous mode [ 1540.498506][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1540.537196][ T26] device bridge_slave_0 left promiscuous mode [ 1540.544694][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1542.542727][ T26] device hsr_slave_0 left promiscuous mode [ 1542.592380][ T26] device hsr_slave_1 left promiscuous mode [ 1542.657428][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1542.668204][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1542.679122][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1542.736631][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1542.807842][ T26] bond0 (unregistering): Released all slaves [ 1542.932924][ T26] device hsr_slave_0 left promiscuous mode [ 1542.972362][ T26] device hsr_slave_1 left promiscuous mode [ 1543.018252][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1543.029374][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1543.039424][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1543.085576][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1543.157983][ T26] bond0 (unregistering): Released all slaves [ 1543.225488][T16727] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1543.339119][T16728] IPVS: ftp: loaded support on port[0] = 21 [ 1543.364543][T16739] IPVS: ftp: loaded support on port[0] = 21 [ 1543.374035][T16737] IPVS: ftp: loaded support on port[0] = 21 [ 1543.542192][T16739] chnl_net:caif_netlink_parms(): no params data found [ 1543.563967][T16728] chnl_net:caif_netlink_parms(): no params data found [ 1543.621604][T16739] bridge0: port 1(bridge_slave_0) entered blocking state [ 1543.631093][T16739] bridge0: port 1(bridge_slave_0) entered disabled state [ 1543.638791][T16739] device bridge_slave_0 entered promiscuous mode [ 1543.656477][T16737] chnl_net:caif_netlink_parms(): no params data found [ 1543.664832][T16739] bridge0: port 2(bridge_slave_1) entered blocking state [ 1543.671890][T16739] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.680128][T16739] device bridge_slave_1 entered promiscuous mode [ 1543.707093][T16728] bridge0: port 1(bridge_slave_0) entered blocking state [ 1543.714336][T16728] bridge0: port 1(bridge_slave_0) entered disabled state [ 1543.722005][T16728] device bridge_slave_0 entered promiscuous mode [ 1543.745041][T16728] bridge0: port 2(bridge_slave_1) entered blocking state [ 1543.752155][T16728] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.761655][T16728] device bridge_slave_1 entered promiscuous mode [ 1543.804471][T16739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1543.815206][T16739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1543.895197][T16737] bridge0: port 1(bridge_slave_0) entered blocking state [ 1543.906801][T16737] bridge0: port 1(bridge_slave_0) entered disabled state [ 1543.915000][T16737] device bridge_slave_0 entered promiscuous mode [ 1543.933878][T16728] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1543.949036][T16739] team0: Port device team_slave_0 added [ 1543.955320][T16737] bridge0: port 2(bridge_slave_1) entered blocking state [ 1543.966989][T16737] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.975048][T16737] device bridge_slave_1 entered promiscuous mode [ 1543.987845][T16728] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1543.998717][T16739] team0: Port device team_slave_1 added [ 1544.027458][T16737] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1544.056029][T16737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1544.076242][T16728] team0: Port device team_slave_0 added [ 1544.098380][T16728] team0: Port device team_slave_1 added [ 1544.155024][T16739] device hsr_slave_0 entered promiscuous mode [ 1544.192699][T16739] device hsr_slave_1 entered promiscuous mode [ 1544.232482][T16739] debugfs: Directory 'hsr0' with parent '/' already present! [ 1544.241125][T16737] team0: Port device team_slave_0 added [ 1544.250694][T16737] team0: Port device team_slave_1 added [ 1544.324860][T16737] device hsr_slave_0 entered promiscuous mode [ 1544.372683][T16737] device hsr_slave_1 entered promiscuous mode [ 1544.412419][T16737] debugfs: Directory 'hsr0' with parent '/' already present! [ 1544.453742][T16728] device hsr_slave_0 entered promiscuous mode [ 1544.492588][T16728] device hsr_slave_1 entered promiscuous mode [ 1544.532364][T16728] debugfs: Directory 'hsr0' with parent '/' already present! [ 1544.645328][T16739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1544.696714][T16737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1544.708970][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1544.720639][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1544.738607][T16728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1544.752217][T16739] 8021q: adding VLAN 0 to HW filter on device team0 [ 1544.771266][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1544.781244][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1544.796298][T16737] 8021q: adding VLAN 0 to HW filter on device team0 [ 1544.807818][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1544.816377][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1544.824838][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1544.831896][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1544.843656][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1544.851514][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1544.862095][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1544.870368][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1544.877433][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1544.893045][T16728] 8021q: adding VLAN 0 to HW filter on device team0 [ 1544.902976][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1544.911300][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1544.918940][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1544.927785][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1544.936807][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1544.945377][T13234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1544.952452][T13234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1544.960127][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1544.969050][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1544.977366][T13234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1544.984430][T13234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1545.005312][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1545.016274][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1545.025164][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1545.034380][T13290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1545.041429][T13290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1545.049205][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1545.057709][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1545.066394][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1545.074804][T13290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1545.081851][T13290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1545.089534][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1545.098055][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1545.106577][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1545.115221][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1545.123998][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1545.131980][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1545.152250][T16739] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1545.163564][T16739] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1545.189601][T16737] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1545.200786][T16737] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1545.213204][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1545.225788][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1545.235404][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1545.244269][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1545.253597][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1545.262063][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1545.270664][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1545.279250][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1545.287916][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1545.296330][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1545.304796][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1545.313763][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1545.322128][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1545.331210][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1545.340440][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1545.349257][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1545.357741][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1545.366180][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1545.374704][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1545.383209][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1545.391464][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1545.399684][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1545.407608][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1545.415541][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1545.432129][T16739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1545.451522][T16728] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1545.465811][T16728] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1545.478461][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1545.487849][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1545.496459][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1545.504849][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1545.513481][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1545.529167][T16737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1545.563748][T16728] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1545.899896][T16756] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:52 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:21:52 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:52 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:52 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:52 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:52 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1546.495388][T16760] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1546.893479][T16766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1546.907060][T16776] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:21:53 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:53 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:53 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:53 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:53 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:53 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:53 executing program 4: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:53 executing program 4: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:53 executing program 4: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) [ 1547.649290][T16782] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1548.116057][T16804] IPVS: ftp: loaded support on port[0] = 21 [ 1548.358430][T16804] chnl_net:caif_netlink_parms(): no params data found [ 1548.386095][T16804] bridge0: port 1(bridge_slave_0) entered blocking state [ 1548.393752][T16804] bridge0: port 1(bridge_slave_0) entered disabled state [ 1548.401332][T16804] device bridge_slave_0 entered promiscuous mode [ 1548.495894][T16804] bridge0: port 2(bridge_slave_1) entered blocking state [ 1548.503322][T16804] bridge0: port 2(bridge_slave_1) entered disabled state [ 1548.510912][T16804] device bridge_slave_1 entered promiscuous mode [ 1548.615838][T16804] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1548.633481][T16804] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1548.647768][ T26] device bridge_slave_1 left promiscuous mode [ 1548.654012][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1548.693427][ T26] device bridge_slave_0 left promiscuous mode [ 1548.699708][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1548.753798][ T26] device bridge_slave_1 left promiscuous mode [ 1548.760031][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1548.803207][ T26] device bridge_slave_0 left promiscuous mode [ 1548.809375][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1548.853309][ T26] device bridge_slave_1 left promiscuous mode [ 1548.859516][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1548.903313][ T26] device bridge_slave_0 left promiscuous mode [ 1548.909449][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1551.172946][ T26] device hsr_slave_0 left promiscuous mode [ 1551.232476][ T26] device hsr_slave_1 left promiscuous mode [ 1551.298587][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1551.309696][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1551.320526][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1551.365184][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1551.446225][ T26] bond0 (unregistering): Released all slaves [ 1551.602883][ T26] device hsr_slave_0 left promiscuous mode [ 1551.642415][ T26] device hsr_slave_1 left promiscuous mode [ 1551.697954][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1551.708980][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1551.718771][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1551.768413][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1551.856959][ T26] bond0 (unregistering): Released all slaves [ 1552.033019][ T26] device hsr_slave_0 left promiscuous mode [ 1552.092423][ T26] device hsr_slave_1 left promiscuous mode [ 1552.139242][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1552.150109][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1552.160273][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1552.205301][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1552.293063][ T26] bond0 (unregistering): Released all slaves [ 1552.385906][T16804] team0: Port device team_slave_0 added [ 1552.392943][T16804] team0: Port device team_slave_1 added [ 1552.434174][T16804] device hsr_slave_0 entered promiscuous mode [ 1552.482830][T16804] device hsr_slave_1 entered promiscuous mode [ 1552.562863][T16804] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1552.574713][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1552.583298][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1552.593835][T16804] 8021q: adding VLAN 0 to HW filter on device team0 [ 1552.603420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1552.612030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1552.620437][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1552.627517][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1552.635735][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1552.649203][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1552.658050][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1552.667015][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1552.674584][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1552.697188][T16804] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1552.707663][T16804] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1552.720625][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1552.729335][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1552.737860][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1552.747593][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1552.756533][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1552.765103][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1552.773883][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1552.790367][T16804] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1552.797625][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1552.805380][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1552.995404][T16812] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:21:59 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:59 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:59 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:59 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x1b, 0x0, &(0x7f0000000240)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:59 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:59 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:21:59 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:21:59 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:00 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:00 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:00 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:00 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1553.990881][T16818] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1554.016155][T16814] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:22:00 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1554.177478][T16832] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:22:00 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:00 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:00 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1554.333783][T16835] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1554.421046][T16840] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1555.888153][T16843] IPVS: ftp: loaded support on port[0] = 21 [ 1556.253138][T16847] IPVS: ftp: loaded support on port[0] = 21 [ 1556.261143][T16848] IPVS: ftp: loaded support on port[0] = 21 [ 1556.270036][T16843] chnl_net:caif_netlink_parms(): no params data found [ 1556.465028][T16843] bridge0: port 1(bridge_slave_0) entered blocking state [ 1556.472218][T16843] bridge0: port 1(bridge_slave_0) entered disabled state [ 1556.479823][T16843] device bridge_slave_0 entered promiscuous mode [ 1556.489395][T16843] bridge0: port 2(bridge_slave_1) entered blocking state [ 1556.496834][T16843] bridge0: port 2(bridge_slave_1) entered disabled state [ 1556.504578][T16843] device bridge_slave_1 entered promiscuous mode [ 1556.654446][T16843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1556.687828][T16843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1556.745632][T16843] team0: Port device team_slave_0 added [ 1556.751599][T16848] chnl_net:caif_netlink_parms(): no params data found [ 1556.975434][T16843] team0: Port device team_slave_1 added [ 1556.997420][T16847] chnl_net:caif_netlink_parms(): no params data found [ 1557.018846][T16848] bridge0: port 1(bridge_slave_0) entered blocking state [ 1557.026499][T16848] bridge0: port 1(bridge_slave_0) entered disabled state [ 1557.034516][T16848] device bridge_slave_0 entered promiscuous mode [ 1557.176833][T16848] bridge0: port 2(bridge_slave_1) entered blocking state [ 1557.184285][T16848] bridge0: port 2(bridge_slave_1) entered disabled state [ 1557.191847][T16848] device bridge_slave_1 entered promiscuous mode [ 1557.254870][T16843] device hsr_slave_0 entered promiscuous mode [ 1557.293281][T16843] device hsr_slave_1 entered promiscuous mode [ 1557.342342][T16843] debugfs: Directory 'hsr0' with parent '/' already present! [ 1557.498327][T16847] bridge0: port 1(bridge_slave_0) entered blocking state [ 1557.505472][T16847] bridge0: port 1(bridge_slave_0) entered disabled state [ 1557.514693][T16847] device bridge_slave_0 entered promiscuous mode [ 1557.525840][T16848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1557.536878][T16848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1557.546264][T16847] bridge0: port 2(bridge_slave_1) entered blocking state [ 1557.553431][T16847] bridge0: port 2(bridge_slave_1) entered disabled state [ 1557.561247][T16847] device bridge_slave_1 entered promiscuous mode [ 1557.588895][T16848] team0: Port device team_slave_0 added [ 1557.719100][T16847] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1557.729480][T16848] team0: Port device team_slave_1 added [ 1557.740506][T16847] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1557.770156][T16847] team0: Port device team_slave_0 added [ 1557.779007][ T26] device bridge_slave_1 left promiscuous mode [ 1557.785499][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1557.813308][ T26] device bridge_slave_0 left promiscuous mode [ 1557.819425][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1557.873349][ T26] device bridge_slave_1 left promiscuous mode [ 1557.879485][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1557.933117][ T26] device bridge_slave_0 left promiscuous mode [ 1557.939257][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1558.013483][ T26] device bridge_slave_1 left promiscuous mode [ 1558.019646][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1558.083067][ T26] device bridge_slave_0 left promiscuous mode [ 1558.089314][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1558.163388][ T26] device bridge_slave_1 left promiscuous mode [ 1558.169634][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1558.213136][ T26] device bridge_slave_0 left promiscuous mode [ 1558.219284][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1561.072729][ T26] device hsr_slave_0 left promiscuous mode [ 1561.112532][ T26] device hsr_slave_1 left promiscuous mode [ 1561.158590][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1561.169264][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1561.179170][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1561.236463][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1561.325640][ T26] bond0 (unregistering): Released all slaves [ 1561.472892][ T26] device hsr_slave_0 left promiscuous mode [ 1561.512464][ T26] device hsr_slave_1 left promiscuous mode [ 1561.558967][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1561.569494][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1561.579229][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1561.645371][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1561.733363][ T26] bond0 (unregistering): Released all slaves [ 1561.862879][ T26] device hsr_slave_0 left promiscuous mode [ 1561.902409][ T26] device hsr_slave_1 left promiscuous mode [ 1561.947832][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1561.960856][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1561.970833][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1562.005309][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1562.065788][ T26] bond0 (unregistering): Released all slaves [ 1562.223758][ T26] device hsr_slave_0 left promiscuous mode [ 1562.272459][ T26] device hsr_slave_1 left promiscuous mode [ 1562.319518][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1562.330273][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1562.340295][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1562.376883][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1562.443119][ T26] bond0 (unregistering): Released all slaves [ 1562.540083][T16847] team0: Port device team_slave_1 added [ 1562.584684][T16848] device hsr_slave_0 entered promiscuous mode [ 1562.622768][T16848] device hsr_slave_1 entered promiscuous mode [ 1562.714831][T16847] device hsr_slave_0 entered promiscuous mode [ 1562.752589][T16847] device hsr_slave_1 entered promiscuous mode [ 1562.792377][T16847] debugfs: Directory 'hsr0' with parent '/' already present! [ 1562.841140][T16843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1562.868244][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1562.876313][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1562.887210][T16843] 8021q: adding VLAN 0 to HW filter on device team0 [ 1562.910970][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1562.921562][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1562.930282][T13290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1562.937365][T13290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1562.945536][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1562.959194][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1562.968043][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1562.976487][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1562.983565][T10395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1562.997908][T16848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1563.009757][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1563.023999][T16848] 8021q: adding VLAN 0 to HW filter on device team0 [ 1563.039079][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1563.046999][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1563.054814][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1563.063989][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1563.072629][ T1038] bridge0: port 1(bridge_slave_0) entered blocking state [ 1563.079675][ T1038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1563.087427][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1563.096302][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1563.104796][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1563.111857][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1563.119897][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1563.132884][T16847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1563.156868][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1563.165732][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1563.174596][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1563.183787][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1563.192013][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1563.201009][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1563.209459][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1563.217846][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1563.226100][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1563.234682][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1563.242199][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1563.250284][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1563.262730][T16847] 8021q: adding VLAN 0 to HW filter on device team0 [ 1563.272180][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1563.281916][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1563.290922][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1563.301546][T16848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1563.316765][T16843] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1563.327339][T16843] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1563.340566][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1563.348622][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1563.357272][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1563.366829][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1563.375393][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1563.383837][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1563.392096][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1563.401605][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1563.409430][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1563.418300][T13290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1563.426725][T13290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1563.433799][T13290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1563.452233][T16848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1563.473107][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1563.481172][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1563.490065][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1563.499023][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1563.506134][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1563.514675][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1563.523478][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1563.532033][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1563.540901][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1563.549264][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1563.557833][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1563.715384][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1563.780573][T16847] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1563.791164][T16847] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1563.810249][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1563.819620][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1563.829885][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1563.839968][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1563.850599][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1563.881858][T16843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1563.909707][T16847] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1564.019477][T16859] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1564.694057][T16871] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1565.227913][T16872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:22:11 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:11 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:11 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:11 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:11 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:11 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:11 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:11 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:12 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:12 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:12 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:12 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:12 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1566.260168][T16875] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1567.168620][T16897] IPVS: ftp: loaded support on port[0] = 21 [ 1567.413532][T16897] chnl_net:caif_netlink_parms(): no params data found [ 1567.440230][T16897] bridge0: port 1(bridge_slave_0) entered blocking state [ 1567.448142][T16897] bridge0: port 1(bridge_slave_0) entered disabled state [ 1567.455963][T16897] device bridge_slave_0 entered promiscuous mode [ 1567.556498][T16897] bridge0: port 2(bridge_slave_1) entered blocking state [ 1567.563948][T16897] bridge0: port 2(bridge_slave_1) entered disabled state [ 1567.571536][T16897] device bridge_slave_1 entered promiscuous mode [ 1567.588938][T16897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1567.600167][T16897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1567.620241][T16897] team0: Port device team_slave_0 added [ 1567.627397][T16897] team0: Port device team_slave_1 added [ 1567.777023][T16900] IPVS: ftp: loaded support on port[0] = 21 [ 1567.814812][T16897] device hsr_slave_0 entered promiscuous mode [ 1567.853530][T16897] device hsr_slave_1 entered promiscuous mode [ 1567.912348][T16897] debugfs: Directory 'hsr0' with parent '/' already present! [ 1568.178544][T16900] chnl_net:caif_netlink_parms(): no params data found [ 1568.305188][T16900] bridge0: port 1(bridge_slave_0) entered blocking state [ 1568.315723][T16900] bridge0: port 1(bridge_slave_0) entered disabled state [ 1568.323435][T16900] device bridge_slave_0 entered promiscuous mode [ 1568.338286][T16897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1568.435569][T16900] bridge0: port 2(bridge_slave_1) entered blocking state [ 1568.442900][T16900] bridge0: port 2(bridge_slave_1) entered disabled state [ 1568.450578][T16900] device bridge_slave_1 entered promiscuous mode [ 1568.469690][T16900] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1568.482531][T16900] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1568.505491][T16900] team0: Port device team_slave_0 added [ 1568.513063][T16900] team0: Port device team_slave_1 added [ 1568.519664][ T26] device bridge_slave_1 left promiscuous mode [ 1568.526156][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1568.573010][ T26] device bridge_slave_0 left promiscuous mode [ 1568.579177][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1568.644329][ T26] device bridge_slave_1 left promiscuous mode [ 1568.650562][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1568.703246][ T26] device bridge_slave_0 left promiscuous mode [ 1568.709493][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1568.753530][ T26] device bridge_slave_1 left promiscuous mode [ 1568.759804][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1568.803260][ T26] device bridge_slave_0 left promiscuous mode [ 1568.809515][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1570.902714][ T26] device hsr_slave_0 left promiscuous mode [ 1570.942784][ T26] device hsr_slave_1 left promiscuous mode [ 1570.996976][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1571.007971][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1571.017768][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1571.086927][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1571.162631][ T26] bond0 (unregistering): Released all slaves [ 1571.282989][ T26] device hsr_slave_0 left promiscuous mode [ 1571.342395][ T26] device hsr_slave_1 left promiscuous mode [ 1571.388165][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1571.399100][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1571.411115][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1571.446816][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1571.524754][ T26] bond0 (unregistering): Released all slaves [ 1571.703681][ T26] device hsr_slave_0 left promiscuous mode [ 1571.752741][ T26] device hsr_slave_1 left promiscuous mode [ 1571.799477][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1571.809422][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1571.820299][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1571.865064][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1571.944341][ T26] bond0 (unregistering): Released all slaves [ 1572.044200][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1572.054749][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1572.064418][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1572.078178][T16897] 8021q: adding VLAN 0 to HW filter on device team0 [ 1572.145021][T16900] device hsr_slave_0 entered promiscuous mode [ 1572.184476][T16900] device hsr_slave_1 entered promiscuous mode [ 1572.241262][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1572.249774][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1572.258116][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1572.265170][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1572.272869][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1572.281327][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1572.289611][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1572.296674][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1572.304297][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1572.315333][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1572.335321][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1572.349910][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1572.360125][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1572.369172][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1572.379693][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1572.388501][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1572.402986][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1572.411309][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1572.428996][T16897] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1572.440812][T16897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1572.448715][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1572.457592][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1572.487736][T16900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1572.501041][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1572.509341][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1572.519437][T16897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1572.528274][T16900] 8021q: adding VLAN 0 to HW filter on device team0 [ 1572.699450][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1572.711878][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1572.733304][T12603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1572.740385][T12603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1572.758295][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1572.784619][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1572.796993][T12603] bridge0: port 2(bridge_slave_1) entered blocking state [ 1572.804097][T12603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1572.812192][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1572.825530][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1572.847075][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1572.855826][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1572.867322][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1572.877273][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1572.893736][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1572.904283][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1572.914394][T16909] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1573.055859][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1573.066620][T16900] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1573.080377][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1573.089129][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1573.118854][T16900] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1573.405386][T16916] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:22:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:20 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:20 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:20 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:20 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:20 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) [ 1573.975110][T16919] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:22:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) [ 1574.695498][T16925] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1575.533077][ T26] device bridge_slave_1 left promiscuous mode [ 1575.539246][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1575.602885][ T26] device bridge_slave_0 left promiscuous mode [ 1575.609024][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1576.402580][ T26] device hsr_slave_0 left promiscuous mode [ 1576.442382][ T26] device hsr_slave_1 left promiscuous mode [ 1576.497131][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1576.507756][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1576.517734][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1576.565504][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1576.656814][ T26] bond0 (unregistering): Released all slaves [ 1576.770216][T16943] IPVS: ftp: loaded support on port[0] = 21 [ 1576.770270][T16946] IPVS: ftp: loaded support on port[0] = 21 [ 1576.787408][T16947] IPVS: ftp: loaded support on port[0] = 21 [ 1577.036401][T16946] chnl_net:caif_netlink_parms(): no params data found [ 1577.067865][T16947] chnl_net:caif_netlink_parms(): no params data found [ 1577.107621][T16943] chnl_net:caif_netlink_parms(): no params data found [ 1577.158941][T16946] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.168066][T16946] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.176411][T16946] device bridge_slave_0 entered promiscuous mode [ 1577.190461][T16946] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.198613][T16946] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.207235][T16946] device bridge_slave_1 entered promiscuous mode [ 1577.221283][T16947] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.229152][T16947] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.237624][T16947] device bridge_slave_0 entered promiscuous mode [ 1577.265944][T16946] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1577.281454][T16947] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.289890][T16947] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.298318][T16947] device bridge_slave_1 entered promiscuous mode [ 1577.306256][T16943] bridge0: port 1(bridge_slave_0) entered blocking state [ 1577.314023][T16943] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.322655][T16943] device bridge_slave_0 entered promiscuous mode [ 1577.331821][T16946] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1577.347467][T16943] bridge0: port 2(bridge_slave_1) entered blocking state [ 1577.355746][T16943] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.363617][T16943] device bridge_slave_1 entered promiscuous mode [ 1577.383232][T16947] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1577.413288][T16947] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1577.437631][T16946] team0: Port device team_slave_0 added [ 1577.449584][T16947] team0: Port device team_slave_0 added [ 1577.457296][T16943] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1577.467386][T16946] team0: Port device team_slave_1 added [ 1577.476918][T16947] team0: Port device team_slave_1 added [ 1577.485936][T16943] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1577.584910][T16946] device hsr_slave_0 entered promiscuous mode [ 1577.622713][T16946] device hsr_slave_1 entered promiscuous mode [ 1577.662380][T16946] debugfs: Directory 'hsr0' with parent '/' already present! [ 1577.675900][T16943] team0: Port device team_slave_0 added [ 1577.724851][T16947] device hsr_slave_0 entered promiscuous mode [ 1577.764279][T16947] device hsr_slave_1 entered promiscuous mode [ 1577.822341][T16947] debugfs: Directory 'hsr0' with parent '/' already present! [ 1577.832568][T16943] team0: Port device team_slave_1 added [ 1577.924294][T16943] device hsr_slave_0 entered promiscuous mode [ 1577.962583][T16943] device hsr_slave_1 entered promiscuous mode [ 1578.002332][T16943] debugfs: Directory 'hsr0' with parent '/' already present! [ 1578.072909][T16946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1578.091455][T16947] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1578.110345][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1578.118620][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1578.128245][T16946] 8021q: adding VLAN 0 to HW filter on device team0 [ 1578.139647][T16947] 8021q: adding VLAN 0 to HW filter on device team0 [ 1578.148003][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1578.156233][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1578.238631][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1578.247585][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1578.256029][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1578.263116][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1578.270840][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1578.279857][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1578.288233][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1578.295310][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1578.302874][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1578.311328][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1578.320010][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1578.327113][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1578.335141][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1578.343914][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1578.352417][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1578.360693][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1578.367775][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1578.375316][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1578.384115][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1578.391991][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1578.452781][T16943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1578.459741][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1578.468863][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1578.486181][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1578.495021][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1578.503320][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1578.511704][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1578.520187][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1578.528786][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1578.537311][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1578.545442][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1578.595618][T16943] 8021q: adding VLAN 0 to HW filter on device team0 [ 1578.603922][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1578.614252][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1578.622815][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1578.631034][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1578.641587][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1578.649381][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1578.664173][T16947] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1578.675443][T16947] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1578.720278][T16946] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1578.731554][T16946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1578.740885][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1578.749086][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1578.757514][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1578.766536][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1578.774669][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1578.783496][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1578.791826][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1578.845838][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1578.854711][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1578.863466][T13289] bridge0: port 1(bridge_slave_0) entered blocking state [ 1578.870516][T13289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1578.878747][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1578.889741][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1578.898236][T13289] bridge0: port 2(bridge_slave_1) entered blocking state [ 1578.905325][T13289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1578.913593][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1578.922622][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1578.934982][T16947] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1578.946727][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1578.975743][T16946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1579.024027][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1579.033117][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1579.041433][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1579.049968][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1579.058739][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1579.067097][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1579.076837][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1579.085130][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1579.094341][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1579.154235][T16943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1579.273726][T16943] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1579.281738][T16964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1579.375559][T16961] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:22:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:25 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:25 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:25 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1579.724972][ T21] device bridge_slave_1 left promiscuous mode [ 1579.731233][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1579.768314][ T21] device bridge_slave_0 left promiscuous mode [ 1579.785894][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1580.892628][ T21] device hsr_slave_0 left promiscuous mode [ 1580.982500][ T21] device hsr_slave_1 left promiscuous mode [ 1581.048581][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1581.058741][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1581.069688][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1581.095726][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1581.157913][ T21] bond0 (unregistering): Released all slaves [ 1581.554870][T16970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1581.570523][T16975] IPVS: ftp: loaded support on port[0] = 21 [ 1581.602628][T16974] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:28 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:28 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:28 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:28 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:28 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1582.120783][T16975] chnl_net:caif_netlink_parms(): no params data found 12:22:28 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) [ 1582.164783][T16978] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:22:28 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:28 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:28 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f00"/20], 0x14) 12:22:28 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, 0x0, 0x0) 12:22:28 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1582.811327][T16988] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1582.828619][T16975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1582.878428][T16975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1582.920896][T16975] device bridge_slave_0 entered promiscuous mode [ 1582.969104][T16975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1582.977635][T16975] bridge0: port 2(bridge_slave_1) entered disabled state [ 1582.996820][T16975] device bridge_slave_1 entered promiscuous mode [ 1583.050920][T16975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1583.108969][T16975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1583.176277][T16975] team0: Port device team_slave_0 added [ 1583.183294][T16975] team0: Port device team_slave_1 added [ 1583.234840][T16975] device hsr_slave_0 entered promiscuous mode [ 1583.262608][T16975] device hsr_slave_1 entered promiscuous mode [ 1583.436852][T16975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1583.471231][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1583.489443][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1583.506889][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1583.517528][T16975] 8021q: adding VLAN 0 to HW filter on device team0 [ 1583.532422][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1583.541783][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1583.554366][T13289] bridge0: port 1(bridge_slave_0) entered blocking state [ 1583.561433][T13289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1583.585776][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1583.596139][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1583.606724][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1583.617067][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1583.624160][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1583.648703][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1583.660937][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1583.669887][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1583.687747][T16975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1583.701832][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1583.711147][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1583.723336][ T1373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1583.745411][T16975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1584.146968][T17003] IPVS: ftp: loaded support on port[0] = 21 [ 1584.311616][T17006] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:22:30 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1584.726849][T17008] IPVS: ftp: loaded support on port[0] = 21 [ 1584.889031][T17010] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1585.135327][T17003] chnl_net:caif_netlink_parms(): no params data found [ 1585.299530][T17003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1585.308983][T17003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1585.316632][T17003] device bridge_slave_0 entered promiscuous mode [ 1585.330642][T17013] IPVS: ftp: loaded support on port[0] = 21 [ 1585.427124][T17003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1585.435779][T17003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1585.444837][T17003] device bridge_slave_1 entered promiscuous mode [ 1585.570326][T17003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1585.607843][T17003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1585.645239][T17008] chnl_net:caif_netlink_parms(): no params data found [ 1585.750812][T17003] team0: Port device team_slave_0 added [ 1585.777958][T17003] team0: Port device team_slave_1 added [ 1585.825791][T17008] bridge0: port 1(bridge_slave_0) entered blocking state [ 1585.835720][T17008] bridge0: port 1(bridge_slave_0) entered disabled state [ 1585.843733][T17008] device bridge_slave_0 entered promiscuous mode [ 1585.863372][ T21] device bridge_slave_1 left promiscuous mode [ 1585.869631][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1585.913169][ T21] device bridge_slave_0 left promiscuous mode [ 1585.919483][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1585.963352][ T21] device bridge_slave_1 left promiscuous mode [ 1585.969487][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1586.012830][ T21] device bridge_slave_0 left promiscuous mode [ 1586.019005][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1586.073600][ T21] device bridge_slave_1 left promiscuous mode [ 1586.079746][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1586.133004][ T21] device bridge_slave_0 left promiscuous mode [ 1586.139160][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1588.303099][ T21] device hsr_slave_0 left promiscuous mode [ 1588.342558][ T21] device hsr_slave_1 left promiscuous mode [ 1588.388686][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1588.399707][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1588.410043][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1588.435723][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1588.508995][ T21] bond0 (unregistering): Released all slaves [ 1588.672928][ T21] device hsr_slave_0 left promiscuous mode [ 1588.712611][ T21] device hsr_slave_1 left promiscuous mode [ 1588.757981][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1588.769068][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1588.779641][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1588.838220][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1588.914644][ T21] bond0 (unregistering): Released all slaves [ 1589.053019][ T21] device hsr_slave_0 left promiscuous mode [ 1589.122395][ T21] device hsr_slave_1 left promiscuous mode [ 1589.177971][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1589.190132][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1589.200016][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1589.235402][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1589.318786][ T21] bond0 (unregistering): Released all slaves [ 1589.454930][T17003] device hsr_slave_0 entered promiscuous mode [ 1589.502659][T17003] device hsr_slave_1 entered promiscuous mode [ 1589.542440][T17003] debugfs: Directory 'hsr0' with parent '/' already present! [ 1589.550100][T17008] bridge0: port 2(bridge_slave_1) entered blocking state [ 1589.557477][T17008] bridge0: port 2(bridge_slave_1) entered disabled state [ 1589.565246][T17008] device bridge_slave_1 entered promiscuous mode [ 1589.578434][T17013] chnl_net:caif_netlink_parms(): no params data found [ 1589.610489][T17008] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1589.635372][T17008] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1589.656254][T17013] bridge0: port 1(bridge_slave_0) entered blocking state [ 1589.663450][T17013] bridge0: port 1(bridge_slave_0) entered disabled state [ 1589.671091][T17013] device bridge_slave_0 entered promiscuous mode [ 1589.680147][T17013] bridge0: port 2(bridge_slave_1) entered blocking state [ 1589.691404][T17013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1589.699218][T17013] device bridge_slave_1 entered promiscuous mode [ 1589.718067][T17008] team0: Port device team_slave_0 added [ 1589.725101][T17008] team0: Port device team_slave_1 added [ 1589.741747][T17013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1589.763289][T17013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1589.815148][T17008] device hsr_slave_0 entered promiscuous mode [ 1589.854010][T17008] device hsr_slave_1 entered promiscuous mode [ 1589.902363][T17008] debugfs: Directory 'hsr0' with parent '/' already present! [ 1589.925262][T17013] team0: Port device team_slave_0 added [ 1589.932231][T17013] team0: Port device team_slave_1 added [ 1589.985508][T17013] device hsr_slave_0 entered promiscuous mode [ 1590.022682][T17013] device hsr_slave_1 entered promiscuous mode [ 1590.072373][T17013] debugfs: Directory 'hsr0' with parent '/' already present! [ 1590.085565][T17003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1590.139564][T17003] 8021q: adding VLAN 0 to HW filter on device team0 [ 1590.247613][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1590.255393][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1590.274121][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1590.282764][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1590.291104][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1590.298202][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1590.323490][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1590.331372][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1590.340355][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1590.352107][T13234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1590.359196][T13234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1590.371491][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1590.380175][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1590.388949][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1590.398361][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1590.407063][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1590.419065][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1590.436919][T17003] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1590.447878][T17003] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1590.464528][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1590.476631][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1590.485166][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1590.496707][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1590.505283][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1590.517087][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1590.559273][T17003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1590.579747][T17008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1590.588230][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1590.617438][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1590.625799][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1590.639204][T17008] 8021q: adding VLAN 0 to HW filter on device team0 [ 1590.650589][T17013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1590.665976][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1590.678114][T12602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1590.700447][T12602] bridge0: port 1(bridge_slave_0) entered blocking state [ 1590.707549][T12602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1590.726710][T17013] 8021q: adding VLAN 0 to HW filter on device team0 [ 1590.765130][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1590.778087][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1590.790553][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1590.799081][T13291] bridge0: port 2(bridge_slave_1) entered blocking state [ 1590.806172][T13291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1590.814405][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1590.822181][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1590.830071][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1590.838906][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1590.847740][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1590.856492][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1590.864848][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1590.873860][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1590.882846][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1590.899613][T17008] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1590.910841][T17008] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1590.924435][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1590.933493][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1590.941823][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1590.948904][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1590.957235][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1590.967601][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1590.975911][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1590.984283][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1590.992488][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1591.001264][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1591.011900][T17022] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1591.303247][T17008] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1591.330509][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1591.346512][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1591.356414][T13234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1591.363504][T13234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1591.371204][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1591.380289][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1591.388942][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1591.397514][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1591.405958][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1591.414857][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1591.423825][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1591.437315][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1591.446661][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1591.469245][T17013] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1591.481273][T17013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1591.492817][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1591.509016][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1591.582767][T17013] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1591.628993][T17031] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:22:38 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:38 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:38 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, 0x0, 0x0) 12:22:38 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1592.219814][T17038] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:38 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, 0x0, 0x0) 12:22:38 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0x0) 12:22:38 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0x0) [ 1592.564231][T17044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1592.582386][T17042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1592.605106][T17047] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:22:38 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:38 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:38 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:39 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0x0) [ 1593.305845][T17063] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1593.318656][T17060] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1593.343042][T17067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1594.033140][ T21] device bridge_slave_1 left promiscuous mode [ 1594.039307][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1594.093396][ T21] device bridge_slave_0 left promiscuous mode [ 1594.099539][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1594.872892][ T21] device hsr_slave_0 left promiscuous mode [ 1594.912507][ T21] device hsr_slave_1 left promiscuous mode [ 1594.958524][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1594.968624][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1594.979656][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1595.056910][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1595.115870][ T21] bond0 (unregistering): Released all slaves [ 1595.208990][T17074] IPVS: ftp: loaded support on port[0] = 21 [ 1595.268406][T17074] chnl_net:caif_netlink_parms(): no params data found [ 1595.298370][T17074] bridge0: port 1(bridge_slave_0) entered blocking state [ 1595.305543][T17074] bridge0: port 1(bridge_slave_0) entered disabled state [ 1595.313372][T17074] device bridge_slave_0 entered promiscuous mode [ 1595.320857][T17074] bridge0: port 2(bridge_slave_1) entered blocking state [ 1595.328244][T17074] bridge0: port 2(bridge_slave_1) entered disabled state [ 1595.335923][T17074] device bridge_slave_1 entered promiscuous mode [ 1595.356430][T17074] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1595.367435][T17074] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1595.386574][T17074] team0: Port device team_slave_0 added [ 1595.393656][T17074] team0: Port device team_slave_1 added [ 1595.454206][T17074] device hsr_slave_0 entered promiscuous mode [ 1595.502534][T17074] device hsr_slave_1 entered promiscuous mode [ 1595.635228][T17074] bridge0: port 2(bridge_slave_1) entered blocking state [ 1595.642348][T17074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1595.649726][T17074] bridge0: port 1(bridge_slave_0) entered blocking state [ 1595.656818][T17074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1595.712196][T17074] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1595.728369][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1595.737903][ T1038] bridge0: port 1(bridge_slave_0) entered disabled state [ 1595.748930][ T1038] bridge0: port 2(bridge_slave_1) entered disabled state [ 1595.763383][T17074] 8021q: adding VLAN 0 to HW filter on device team0 [ 1595.777243][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1595.787294][T13291] bridge0: port 1(bridge_slave_0) entered blocking state [ 1595.794396][T13291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1595.815360][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1595.827465][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1595.834581][T10395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1595.859740][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1595.872114][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1595.881395][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1595.898413][T17074] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1595.913497][T17074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1595.922380][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1595.934106][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1595.965007][T17074] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1596.092985][T17082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:22:42 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/164, 0xa4) 12:22:42 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) 12:22:42 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:42 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:42 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:42 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1596.547222][T17089] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:22:42 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) [ 1596.604394][T17090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1596.640620][T17086] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:22:42 executing program 5: 12:22:42 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:42 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:42 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:43 executing program 5: 12:22:43 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) 12:22:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0}) 12:22:43 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f"], 0xa) [ 1597.499547][T17102] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1597.513924][T17105] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1598.153279][ T21] device bridge_slave_1 left promiscuous mode [ 1598.159434][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1598.203337][ T21] device bridge_slave_0 left promiscuous mode [ 1598.209470][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1598.973181][ T21] device hsr_slave_0 left promiscuous mode [ 1599.042364][ T21] device hsr_slave_1 left promiscuous mode [ 1599.098217][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1599.108878][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1599.119555][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1599.166274][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1599.244291][ T21] bond0 (unregistering): Released all slaves [ 1599.370148][T17122] IPVS: ftp: loaded support on port[0] = 21 [ 1599.441066][T17122] chnl_net:caif_netlink_parms(): no params data found [ 1599.469624][T17122] bridge0: port 1(bridge_slave_0) entered blocking state [ 1599.476773][T17122] bridge0: port 1(bridge_slave_0) entered disabled state [ 1599.484581][T17122] device bridge_slave_0 entered promiscuous mode [ 1599.491991][T17122] bridge0: port 2(bridge_slave_1) entered blocking state [ 1599.499168][T17122] bridge0: port 2(bridge_slave_1) entered disabled state [ 1599.506707][T17122] device bridge_slave_1 entered promiscuous mode [ 1599.523065][T17122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1599.533392][T17122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1599.550927][T17122] team0: Port device team_slave_0 added [ 1599.557735][T17122] team0: Port device team_slave_1 added [ 1599.624940][T17122] device hsr_slave_0 entered promiscuous mode [ 1599.662965][T17122] device hsr_slave_1 entered promiscuous mode [ 1599.702400][T17122] debugfs: Directory 'hsr0' with parent '/' already present! [ 1599.753411][T17122] bridge0: port 2(bridge_slave_1) entered blocking state [ 1599.760586][T17122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1599.767970][T17122] bridge0: port 1(bridge_slave_0) entered blocking state [ 1599.775105][T17122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1599.820984][T17122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1599.837956][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1599.849095][ T881] bridge0: port 1(bridge_slave_0) entered disabled state [ 1599.857291][ T881] bridge0: port 2(bridge_slave_1) entered disabled state [ 1599.872828][T17122] 8021q: adding VLAN 0 to HW filter on device team0 [ 1599.886516][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1599.895407][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1599.902494][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1599.926640][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1599.936514][ T1767] bridge0: port 2(bridge_slave_1) entered blocking state [ 1599.943610][ T1767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1599.955291][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1599.975985][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1599.985296][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1599.995573][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1600.005327][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1600.016633][T17122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1600.041056][T17122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1600.219489][T17130] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:46 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f"], 0xa) 12:22:46 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') lchown(&(0x7f0000000000)='./file0//ile0\x00', 0x0, 0x0) 12:22:46 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:46 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:46 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:46 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1600.766282][T17136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:22:46 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f"], 0xa) 12:22:47 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) [ 1600.848505][T17137] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:22:47 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:47 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1600.932688][T17142] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:47 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:47 executing program 5: sched_setaffinity(0x0, 0xfffffe8f, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000180007041dfffd946f6105000a00000a1f000007002808000800080004001000", 0x24}], 0x1}, 0x0) 12:22:47 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f0000000000"], 0xf) 12:22:47 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1601.444325][T17155] __nla_validate_parse: 1 callbacks suppressed [ 1601.444354][T17155] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1601.465382][T17157] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1601.533257][T17165] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1602.233341][ T26] device bridge_slave_1 left promiscuous mode [ 1602.239508][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 1602.313253][ T26] device bridge_slave_0 left promiscuous mode [ 1602.319407][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 1603.042932][ T26] device hsr_slave_0 left promiscuous mode [ 1603.082380][ T26] device hsr_slave_1 left promiscuous mode [ 1603.128185][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1603.138202][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1603.148418][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1603.187908][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1603.262901][ T26] bond0 (unregistering): Released all slaves [ 1603.378837][T17174] IPVS: ftp: loaded support on port[0] = 21 [ 1603.441065][T17174] chnl_net:caif_netlink_parms(): no params data found [ 1603.469695][T17174] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.476845][T17174] bridge0: port 1(bridge_slave_0) entered disabled state [ 1603.484388][T17174] device bridge_slave_0 entered promiscuous mode [ 1603.491853][T17174] bridge0: port 2(bridge_slave_1) entered blocking state [ 1603.498971][T17174] bridge0: port 2(bridge_slave_1) entered disabled state [ 1603.506538][T17174] device bridge_slave_1 entered promiscuous mode [ 1603.523753][T17174] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1603.534658][T17174] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1603.554663][T17174] team0: Port device team_slave_0 added [ 1603.561806][T17174] team0: Port device team_slave_1 added [ 1603.684774][T17174] device hsr_slave_0 entered promiscuous mode [ 1603.742571][T17174] device hsr_slave_1 entered promiscuous mode [ 1603.795187][T17174] debugfs: Directory 'hsr0' with parent '/' already present! [ 1603.818131][T17174] bridge0: port 2(bridge_slave_1) entered blocking state [ 1603.825222][T17174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1603.832580][T17174] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.839634][T17174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1603.903285][T17174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1603.918543][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1603.927806][T13234] bridge0: port 1(bridge_slave_0) entered disabled state [ 1603.935612][T13234] bridge0: port 2(bridge_slave_1) entered disabled state [ 1603.947524][T17174] 8021q: adding VLAN 0 to HW filter on device team0 [ 1603.957471][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1603.966096][T13234] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.973163][T13234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1603.994481][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1604.003310][T13291] bridge0: port 2(bridge_slave_1) entered blocking state [ 1604.010404][T13291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1604.019018][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1604.027966][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1604.043746][T17174] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1604.054409][T17174] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1604.067255][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1604.075605][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1604.084183][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1604.095925][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1604.121785][T17174] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1604.244716][T17182] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:22:50 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:50 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f0000000000"], 0xf) 12:22:50 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:50 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:50 executing program 5: 12:22:50 executing program 5: 12:22:50 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1604.642087][T17187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1604.671816][T17191] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:50 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:50 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f0000000000"], 0xf) 12:22:50 executing program 5: 12:22:50 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f0000000000000000"], 0x12) 12:22:51 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:51 executing program 5: 12:22:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f0000000000000000"], 0x12) 12:22:51 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:51 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1605.085685][T17190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1605.099306][T17202] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1605.117817][T17201] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:22:51 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:51 executing program 5: 12:22:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f0000000000000000"], 0x12) 12:22:51 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:51 executing program 5: 12:22:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f000000000000000000"], 0x13) 12:22:51 executing program 5: r0 = socket$kcm(0xa, 0x100000000000001, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, 0x0}, 0x2000c4ff) 12:22:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f000000000000000000"], 0x13) [ 1605.629034][T17222] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:22:51 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:51 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:51 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open$dir(0x0, 0x0, 0x0) write$P9_RSTATFS(r0, 0x0, 0x0) 12:22:51 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:52 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600ff0000032f000000000000000000"], 0x13) 12:22:52 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:52 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1606.823200][ T7] device bridge_slave_1 left promiscuous mode [ 1606.829377][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1606.883036][ T7] device bridge_slave_0 left promiscuous mode [ 1606.889176][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1607.652786][ T7] device hsr_slave_0 left promiscuous mode [ 1607.692363][ T7] device hsr_slave_1 left promiscuous mode [ 1607.748123][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1607.759548][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1607.770406][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1607.795671][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1607.883937][ T7] bond0 (unregistering): Released all slaves [ 1607.998471][T17262] IPVS: ftp: loaded support on port[0] = 21 [ 1608.071015][T17262] chnl_net:caif_netlink_parms(): no params data found [ 1608.096496][T17262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1608.103647][T17262] bridge0: port 1(bridge_slave_0) entered disabled state [ 1608.111170][T17262] device bridge_slave_0 entered promiscuous mode [ 1608.118730][T17262] bridge0: port 2(bridge_slave_1) entered blocking state [ 1608.125869][T17262] bridge0: port 2(bridge_slave_1) entered disabled state [ 1608.133535][T17262] device bridge_slave_1 entered promiscuous mode [ 1608.194207][T17262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1608.207837][T17262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1608.228260][T17262] team0: Port device team_slave_0 added [ 1608.239048][T17262] team0: Port device team_slave_1 added [ 1608.297922][T17262] device hsr_slave_0 entered promiscuous mode [ 1608.355291][T17262] device hsr_slave_1 entered promiscuous mode [ 1608.395228][T17262] debugfs: Directory 'hsr0' with parent '/' already present! [ 1608.420184][T17262] bridge0: port 2(bridge_slave_1) entered blocking state [ 1608.427276][T17262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1608.434642][T17262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1608.441698][T17262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1608.495066][T17262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1608.509963][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1608.518713][ T881] bridge0: port 1(bridge_slave_0) entered disabled state [ 1608.526577][ T881] bridge0: port 2(bridge_slave_1) entered disabled state [ 1608.537807][T17262] 8021q: adding VLAN 0 to HW filter on device team0 [ 1608.547732][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1608.556213][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1608.563286][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1608.574666][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1608.585629][T13291] bridge0: port 2(bridge_slave_1) entered blocking state [ 1608.592718][T13291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1608.615032][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1608.626508][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1608.654352][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1608.666315][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1608.674735][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1608.688637][T17262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1608.705073][T17262] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1608.825106][T17270] __nla_validate_parse: 5 callbacks suppressed [ 1608.825135][T17270] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:22:55 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:55 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:55 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:55 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 12:22:55 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:55 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000d40)='^#\\\x00', 0x4) 12:22:55 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:55 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:22:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1609.266334][T17278] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:22:55 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:55 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:55 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:56 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:56 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1610.016060][T17288] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1610.047315][T17295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1610.236517][T17311] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1610.773510][ T7] device bridge_slave_1 left promiscuous mode [ 1610.779712][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1610.853227][ T7] device bridge_slave_0 left promiscuous mode [ 1610.859380][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1611.602803][ T7] device hsr_slave_0 left promiscuous mode [ 1611.642434][ T7] device hsr_slave_1 left promiscuous mode [ 1611.697249][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1611.710320][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1611.720366][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1611.776412][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1611.832928][ T7] bond0 (unregistering): Released all slaves [ 1611.942074][T17320] IPVS: ftp: loaded support on port[0] = 21 [ 1612.004058][T17320] chnl_net:caif_netlink_parms(): no params data found [ 1612.031200][T17320] bridge0: port 1(bridge_slave_0) entered blocking state [ 1612.038448][T17320] bridge0: port 1(bridge_slave_0) entered disabled state [ 1612.046194][T17320] device bridge_slave_0 entered promiscuous mode [ 1612.053991][T17320] bridge0: port 2(bridge_slave_1) entered blocking state [ 1612.061156][T17320] bridge0: port 2(bridge_slave_1) entered disabled state [ 1612.068930][T17320] device bridge_slave_1 entered promiscuous mode [ 1612.087407][T17320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1612.097927][T17320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1612.117679][T17320] team0: Port device team_slave_0 added [ 1612.124847][T17320] team0: Port device team_slave_1 added [ 1612.184929][T17320] device hsr_slave_0 entered promiscuous mode [ 1612.232950][T17320] device hsr_slave_1 entered promiscuous mode [ 1612.272405][T17320] debugfs: Directory 'hsr0' with parent '/' already present! [ 1612.325428][T17320] bridge0: port 2(bridge_slave_1) entered blocking state [ 1612.332533][T17320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1612.339868][T17320] bridge0: port 1(bridge_slave_0) entered blocking state [ 1612.346964][T17320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1612.405065][T17320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1612.424476][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1612.436838][T13234] bridge0: port 1(bridge_slave_0) entered disabled state [ 1612.444598][T13234] bridge0: port 2(bridge_slave_1) entered disabled state [ 1612.458579][T17320] 8021q: adding VLAN 0 to HW filter on device team0 [ 1612.470895][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1612.479889][T13234] bridge0: port 1(bridge_slave_0) entered blocking state [ 1612.486981][T13234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1612.509974][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1612.521776][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1612.528869][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1612.547798][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1612.557410][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1612.569149][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1612.581019][T17320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1612.595692][T17320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1612.604602][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1612.616141][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1612.638283][T17320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1612.791149][T17328] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:59 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:59 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:59 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:59 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:22:59 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1613.282410][T17334] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1613.336680][T17335] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:22:59 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:22:59 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1613.797338][T17336] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1613.820664][T17350] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:23:00 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:00 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:00 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1613.849744][T17351] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:23:00 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1614.031176][T17355] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:23:00 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1614.470687][T17360] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1614.491230][T17362] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1615.214629][T17375] IPVS: ftp: loaded support on port[0] = 21 [ 1615.338560][T17375] chnl_net:caif_netlink_parms(): no params data found [ 1615.430576][T17375] bridge0: port 1(bridge_slave_0) entered blocking state [ 1615.439113][T17375] bridge0: port 1(bridge_slave_0) entered disabled state [ 1615.447497][T17375] device bridge_slave_0 entered promiscuous mode [ 1615.515882][T17375] bridge0: port 2(bridge_slave_1) entered blocking state [ 1615.523594][T17375] bridge0: port 2(bridge_slave_1) entered disabled state [ 1615.531766][T17375] device bridge_slave_1 entered promiscuous mode [ 1615.549737][T17375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1615.560710][T17375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1615.580036][T17375] team0: Port device team_slave_0 added [ 1615.587695][T17375] team0: Port device team_slave_1 added [ 1615.595784][ T7] device bridge_slave_1 left promiscuous mode [ 1615.602288][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1615.655051][ T7] device bridge_slave_0 left promiscuous mode [ 1615.661657][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1615.713901][ T7] device bridge_slave_1 left promiscuous mode [ 1615.721631][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1615.776214][ T7] device bridge_slave_0 left promiscuous mode [ 1615.783093][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1617.242981][ T7] device hsr_slave_0 left promiscuous mode [ 1617.282465][ T7] device hsr_slave_1 left promiscuous mode [ 1617.358875][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1617.371224][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1617.382124][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1617.425733][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1617.505399][ T7] bond0 (unregistering): Released all slaves [ 1617.642995][ T7] device hsr_slave_0 left promiscuous mode [ 1617.684388][ T7] device hsr_slave_1 left promiscuous mode [ 1617.758005][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1617.768745][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1617.778900][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1617.825397][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1617.898195][ T7] bond0 (unregistering): Released all slaves [ 1618.003415][T17378] IPVS: ftp: loaded support on port[0] = 21 [ 1618.055156][T17375] device hsr_slave_0 entered promiscuous mode [ 1618.092710][T17375] device hsr_slave_1 entered promiscuous mode [ 1618.132402][T17375] debugfs: Directory 'hsr0' with parent '/' already present! [ 1618.208552][T17378] chnl_net:caif_netlink_parms(): no params data found [ 1618.244811][T17378] bridge0: port 1(bridge_slave_0) entered blocking state [ 1618.251944][T17378] bridge0: port 1(bridge_slave_0) entered disabled state [ 1618.259805][T17378] device bridge_slave_0 entered promiscuous mode [ 1618.269892][T17378] bridge0: port 2(bridge_slave_1) entered blocking state [ 1618.279047][T17378] bridge0: port 2(bridge_slave_1) entered disabled state [ 1618.287989][T17378] device bridge_slave_1 entered promiscuous mode [ 1618.306924][T17378] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1618.318646][T17378] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1618.436115][T17378] team0: Port device team_slave_0 added [ 1618.445344][T17375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1618.454428][T17378] team0: Port device team_slave_1 added [ 1618.477550][T17375] 8021q: adding VLAN 0 to HW filter on device team0 [ 1618.487260][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1618.498313][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1618.565445][T17378] device hsr_slave_0 entered promiscuous mode [ 1618.603554][T17378] device hsr_slave_1 entered promiscuous mode [ 1618.655098][T17378] debugfs: Directory 'hsr0' with parent '/' already present! [ 1618.663440][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1618.675651][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1618.684496][ T1767] bridge0: port 1(bridge_slave_0) entered blocking state [ 1618.691788][ T1767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1618.701976][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1618.710992][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1618.719749][ T1767] bridge0: port 2(bridge_slave_1) entered blocking state [ 1618.727418][ T1767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1618.736050][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1618.744966][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1618.753791][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1618.762660][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1618.777923][T17375] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1618.789621][T17375] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1618.804287][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1618.812323][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1618.820494][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1618.830600][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1618.841741][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1618.850277][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1618.859233][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1618.868146][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1618.877562][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1618.902062][T17375] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1618.954457][T17378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1618.969420][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1618.982194][T17378] 8021q: adding VLAN 0 to HW filter on device team0 [ 1619.018138][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1619.038253][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1619.045576][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1619.064670][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1619.076038][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1619.085312][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1619.096447][ T1481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1619.103556][ T1481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1619.111773][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1619.126028][T17386] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1619.253128][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1619.261694][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1619.270643][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1619.279303][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1619.289009][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1619.297725][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1619.306146][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1619.314666][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1619.323598][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1619.332050][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 12:23:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:05 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:05 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:05 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1619.347486][T17378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1619.372902][T17378] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1619.458476][T17392] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1619.490346][T17394] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:23:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1619.504267][T17393] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:23:05 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:05 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1619.794504][T17415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1619.810457][T17412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:05 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1619.836654][T17408] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:23:06 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1620.128175][T17418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1620.456489][T17426] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:23:06 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:06 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:06 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:06 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:06 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:06 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:07 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1621.091086][T17444] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:23:07 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:07 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:07 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1621.963011][T13172] device bridge_slave_1 left promiscuous mode [ 1621.969413][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1622.012910][T13172] device bridge_slave_0 left promiscuous mode [ 1622.019124][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1622.822654][T13172] device hsr_slave_0 left promiscuous mode [ 1622.882379][T13172] device hsr_slave_1 left promiscuous mode [ 1622.938421][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1622.948388][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1622.958245][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1623.026468][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1623.085200][T13172] bond0 (unregistering): Released all slaves [ 1623.158719][T17497] IPVS: ftp: loaded support on port[0] = 21 [ 1623.218956][T17497] chnl_net:caif_netlink_parms(): no params data found [ 1623.244244][T17497] bridge0: port 1(bridge_slave_0) entered blocking state [ 1623.251298][T17497] bridge0: port 1(bridge_slave_0) entered disabled state [ 1623.259325][T17497] device bridge_slave_0 entered promiscuous mode [ 1623.266766][T17497] bridge0: port 2(bridge_slave_1) entered blocking state [ 1623.274115][T17497] bridge0: port 2(bridge_slave_1) entered disabled state [ 1623.281904][T17497] device bridge_slave_1 entered promiscuous mode [ 1623.344160][T17497] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1623.359129][T17497] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1623.386177][T17497] team0: Port device team_slave_0 added [ 1623.396878][T17497] team0: Port device team_slave_1 added [ 1623.464864][T17497] device hsr_slave_0 entered promiscuous mode [ 1623.552580][T17497] device hsr_slave_1 entered promiscuous mode [ 1623.612305][T17497] debugfs: Directory 'hsr0' with parent '/' already present! [ 1623.631858][T17497] bridge0: port 2(bridge_slave_1) entered blocking state [ 1623.638962][T17497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1623.646310][T17497] bridge0: port 1(bridge_slave_0) entered blocking state [ 1623.653358][T17497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1623.687283][T17497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1623.699817][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1623.708171][T13289] bridge0: port 1(bridge_slave_0) entered disabled state [ 1623.715990][T13289] bridge0: port 2(bridge_slave_1) entered disabled state [ 1623.728318][T17497] 8021q: adding VLAN 0 to HW filter on device team0 [ 1623.739181][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1623.747922][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1623.755013][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1623.772948][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1623.781335][ T1481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1623.788430][ T1481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1623.802988][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1623.811564][T13289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1623.830049][T17497] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1623.840697][T17497] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1623.853699][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1623.861544][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1623.870029][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1623.878569][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1623.903259][T17497] 8021q: adding VLAN 0 to HW filter on device batadv0 12:23:10 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:10 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:10 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:10 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:10 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:10 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1624.577966][T17511] __nla_validate_parse: 3 callbacks suppressed [ 1624.577980][T17511] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:23:10 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1624.623861][T17518] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:23:10 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:10 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:10 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:11 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1624.991410][T17535] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1625.021375][T17541] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:23:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:11 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1625.299896][T17546] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1625.325437][T17550] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1625.499025][T17561] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1625.982793][T13172] device bridge_slave_1 left promiscuous mode [ 1625.988940][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1626.053054][T13172] device bridge_slave_0 left promiscuous mode [ 1626.059204][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1626.852676][T13172] device hsr_slave_0 left promiscuous mode [ 1626.892388][T13172] device hsr_slave_1 left promiscuous mode [ 1626.938043][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1626.949013][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1626.959804][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1627.016153][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1627.086804][T13172] bond0 (unregistering): Released all slaves [ 1627.189737][T17568] IPVS: ftp: loaded support on port[0] = 21 [ 1627.299837][T17568] chnl_net:caif_netlink_parms(): no params data found [ 1627.343493][T17568] bridge0: port 1(bridge_slave_0) entered blocking state [ 1627.350727][T17568] bridge0: port 1(bridge_slave_0) entered disabled state [ 1627.363446][T17568] device bridge_slave_0 entered promiscuous mode [ 1627.371492][T17568] bridge0: port 2(bridge_slave_1) entered blocking state [ 1627.381346][T17568] bridge0: port 2(bridge_slave_1) entered disabled state [ 1627.389942][T17568] device bridge_slave_1 entered promiscuous mode [ 1627.417343][T17568] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1627.429275][T17568] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1627.457453][T17568] team0: Port device team_slave_0 added [ 1627.464853][T17568] team0: Port device team_slave_1 added [ 1627.525565][T17568] device hsr_slave_0 entered promiscuous mode [ 1627.603820][T17568] device hsr_slave_1 entered promiscuous mode [ 1627.642401][T17568] debugfs: Directory 'hsr0' with parent '/' already present! [ 1627.661036][T17568] bridge0: port 2(bridge_slave_1) entered blocking state [ 1627.668143][T17568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1627.676017][T17568] bridge0: port 1(bridge_slave_0) entered blocking state [ 1627.683112][T17568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1627.715574][T17568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1627.729919][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1627.739157][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1627.747022][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1627.760216][T17568] 8021q: adding VLAN 0 to HW filter on device team0 [ 1627.771369][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1627.780304][ T1481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1627.787382][ T1481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1627.805134][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1627.813506][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1627.820554][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1627.840460][T17568] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1627.851037][T17568] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1627.863781][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1627.872176][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1627.880729][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1627.889026][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1627.898300][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1627.905932][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1627.923434][T17568] 8021q: adding VLAN 0 to HW filter on device batadv0 12:23:14 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:14 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:14 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:14 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:14 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1628.120957][T17579] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1628.133450][T17582] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1628.153328][T17581] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:14 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:14 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:15 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:15 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:15 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1629.752971][T13172] device bridge_slave_1 left promiscuous mode [ 1629.759139][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1629.813151][T13172] device bridge_slave_0 left promiscuous mode [ 1629.819296][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1630.553253][T13172] device hsr_slave_0 left promiscuous mode [ 1630.622383][T13172] device hsr_slave_1 left promiscuous mode [ 1630.707389][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1630.717397][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1630.727580][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1630.775708][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1630.837912][T13172] bond0 (unregistering): Released all slaves [ 1630.970465][T17624] IPVS: ftp: loaded support on port[0] = 21 [ 1631.039811][T17624] chnl_net:caif_netlink_parms(): no params data found [ 1631.068878][T17624] bridge0: port 1(bridge_slave_0) entered blocking state [ 1631.076152][T17624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1631.083776][T17624] device bridge_slave_0 entered promiscuous mode [ 1631.091335][T17624] bridge0: port 2(bridge_slave_1) entered blocking state [ 1631.098558][T17624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1631.106564][T17624] device bridge_slave_1 entered promiscuous mode [ 1631.127815][T17624] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1631.138434][T17624] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1631.158087][T17624] team0: Port device team_slave_0 added [ 1631.165095][T17624] team0: Port device team_slave_1 added [ 1631.224901][T17624] device hsr_slave_0 entered promiscuous mode [ 1631.262543][T17624] device hsr_slave_1 entered promiscuous mode [ 1631.353013][T17624] bridge0: port 2(bridge_slave_1) entered blocking state [ 1631.360098][T17624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1631.367462][T17624] bridge0: port 1(bridge_slave_0) entered blocking state [ 1631.374544][T17624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1631.437607][T17624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1631.455738][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1631.467569][ T1481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1631.475526][ T1481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1631.493762][T17624] 8021q: adding VLAN 0 to HW filter on device team0 [ 1631.505111][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1631.518885][T13234] bridge0: port 1(bridge_slave_0) entered blocking state [ 1631.525979][T13234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1631.548606][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1631.560657][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1631.567743][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1631.590312][T17624] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1631.607940][T17624] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1631.623340][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1631.631883][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1631.645487][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1631.657334][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1631.678967][T17624] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1631.686628][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1631.694591][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1631.783328][T17632] __nla_validate_parse: 5 callbacks suppressed [ 1631.783343][T17632] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:23:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:18 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:18 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:18 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1632.281487][T17637] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1632.338846][T17635] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1632.446112][T17645] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:23:18 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:18 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1632.526135][T17650] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1632.613173][T17652] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:18 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:18 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:18 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1633.308379][T17658] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1633.336230][T17668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1633.365549][T17670] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1634.348893][T17687] IPVS: ftp: loaded support on port[0] = 21 [ 1634.388327][T13172] device bridge_slave_1 left promiscuous mode [ 1634.396467][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1634.453583][T13172] device bridge_slave_0 left promiscuous mode [ 1634.459885][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1634.543310][T13172] device bridge_slave_1 left promiscuous mode [ 1634.549445][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1634.593075][T13172] device bridge_slave_0 left promiscuous mode [ 1634.599244][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1636.002647][T13172] device hsr_slave_0 left promiscuous mode [ 1636.052478][T13172] device hsr_slave_1 left promiscuous mode [ 1636.128061][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1636.139155][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1636.149193][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1636.215059][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1636.284084][T13172] bond0 (unregistering): Released all slaves [ 1636.392765][T13172] device hsr_slave_0 left promiscuous mode [ 1636.462359][T13172] device hsr_slave_1 left promiscuous mode [ 1636.508370][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1636.519320][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1636.529442][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1636.596135][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1636.668078][T13172] bond0 (unregistering): Released all slaves [ 1636.793851][T17687] chnl_net:caif_netlink_parms(): no params data found [ 1636.804741][T17689] IPVS: ftp: loaded support on port[0] = 21 [ 1636.854492][T17687] bridge0: port 1(bridge_slave_0) entered blocking state [ 1636.861565][T17687] bridge0: port 1(bridge_slave_0) entered disabled state [ 1636.870880][T17687] device bridge_slave_0 entered promiscuous mode [ 1636.891480][T17687] bridge0: port 2(bridge_slave_1) entered blocking state [ 1636.898754][T17687] bridge0: port 2(bridge_slave_1) entered disabled state [ 1636.906562][T17687] device bridge_slave_1 entered promiscuous mode [ 1636.924677][T17687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1636.937098][T17687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1636.966443][T17687] team0: Port device team_slave_0 added [ 1636.973894][T17687] team0: Port device team_slave_1 added [ 1637.054356][T17687] device hsr_slave_0 entered promiscuous mode [ 1637.102761][T17687] device hsr_slave_1 entered promiscuous mode [ 1637.142393][T17687] debugfs: Directory 'hsr0' with parent '/' already present! [ 1637.173270][T17689] chnl_net:caif_netlink_parms(): no params data found [ 1637.296069][T17687] bridge0: port 2(bridge_slave_1) entered blocking state [ 1637.303168][T17687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1637.310420][T17687] bridge0: port 1(bridge_slave_0) entered blocking state [ 1637.317506][T17687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1637.351094][T17689] bridge0: port 1(bridge_slave_0) entered blocking state [ 1637.359390][T17689] bridge0: port 1(bridge_slave_0) entered disabled state [ 1637.367350][T17689] device bridge_slave_0 entered promiscuous mode [ 1637.383544][T17689] bridge0: port 2(bridge_slave_1) entered blocking state [ 1637.390789][T17689] bridge0: port 2(bridge_slave_1) entered disabled state [ 1637.402040][T17689] device bridge_slave_1 entered promiscuous mode [ 1637.436947][T17689] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1637.458266][T17689] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1637.482850][T17689] team0: Port device team_slave_0 added [ 1637.491252][T17689] team0: Port device team_slave_1 added [ 1637.502092][T17687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1637.530243][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1637.539423][T13291] bridge0: port 1(bridge_slave_0) entered disabled state [ 1637.550647][T13291] bridge0: port 2(bridge_slave_1) entered disabled state [ 1637.559452][T13291] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1637.588761][T17687] 8021q: adding VLAN 0 to HW filter on device team0 [ 1637.634699][T17689] device hsr_slave_0 entered promiscuous mode [ 1637.673189][T17689] device hsr_slave_1 entered promiscuous mode [ 1637.712302][T17689] debugfs: Directory 'hsr0' with parent '/' already present! [ 1637.737283][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1637.745945][ T881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1637.753040][ T881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1637.760900][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1637.769579][ T881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1637.776678][ T881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1637.785015][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1637.794265][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1637.809159][T17687] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1637.819796][T17687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1637.832134][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1637.841254][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1637.850024][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1637.863425][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1637.871780][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1637.880224][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1637.898857][ T1481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1637.922124][T17687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1637.988270][T17689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1638.006860][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1638.017762][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1638.038564][T17689] 8021q: adding VLAN 0 to HW filter on device team0 [ 1638.060953][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1638.074677][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1638.083892][T10395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1638.090935][T10395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1638.099133][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1638.118196][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1638.127279][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1638.136463][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1638.143552][T10395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1638.151296][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1638.160349][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1638.169113][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1638.178030][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1638.198829][T17689] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1638.213197][T17689] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1638.224956][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1638.232989][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1638.241730][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1638.252143][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1638.260963][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1638.269759][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1638.278852][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1638.287528][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1638.314586][T17689] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1638.529777][T17706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:23:25 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:25 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:25 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:25 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1639.063072][T17714] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1639.098181][T17713] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:25 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:25 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1639.682605][T17733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1639.712638][T17736] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:25 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1639.754009][T17743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:23:26 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:26 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:26 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1639.987014][T17757] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1640.006713][T17763] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1640.415443][T17769] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1640.883222][T13172] device bridge_slave_1 left promiscuous mode [ 1640.889478][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1640.953442][T13172] device bridge_slave_0 left promiscuous mode [ 1640.959660][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1641.762621][T13172] device hsr_slave_0 left promiscuous mode [ 1641.822390][T13172] device hsr_slave_1 left promiscuous mode [ 1641.909653][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1641.921261][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1641.932735][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1641.976715][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1642.067866][T13172] bond0 (unregistering): Released all slaves [ 1642.169977][T17778] IPVS: ftp: loaded support on port[0] = 21 [ 1642.170174][T17780] IPVS: ftp: loaded support on port[0] = 21 [ 1642.274681][T17778] chnl_net:caif_netlink_parms(): no params data found [ 1642.431768][T17778] bridge0: port 1(bridge_slave_0) entered blocking state [ 1642.439579][T17778] bridge0: port 1(bridge_slave_0) entered disabled state [ 1642.451384][T17778] device bridge_slave_0 entered promiscuous mode [ 1642.459802][T17780] chnl_net:caif_netlink_parms(): no params data found [ 1642.475151][T17778] bridge0: port 2(bridge_slave_1) entered blocking state [ 1642.486250][T17778] bridge0: port 2(bridge_slave_1) entered disabled state [ 1642.494444][T17778] device bridge_slave_1 entered promiscuous mode [ 1642.552868][T17778] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1642.567241][T17780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1642.575096][T17780] bridge0: port 1(bridge_slave_0) entered disabled state [ 1642.586993][T17780] device bridge_slave_0 entered promiscuous mode [ 1642.596349][T17778] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1642.615525][T17780] bridge0: port 2(bridge_slave_1) entered blocking state [ 1642.622669][T17780] bridge0: port 2(bridge_slave_1) entered disabled state [ 1642.630440][T17780] device bridge_slave_1 entered promiscuous mode [ 1642.654243][T17778] team0: Port device team_slave_0 added [ 1642.666717][T17778] team0: Port device team_slave_1 added [ 1642.674716][T17780] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1642.685467][T17780] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1642.718620][T17780] team0: Port device team_slave_0 added [ 1642.774902][T17778] device hsr_slave_0 entered promiscuous mode [ 1642.812607][T17778] device hsr_slave_1 entered promiscuous mode [ 1642.862328][T17778] debugfs: Directory 'hsr0' with parent '/' already present! [ 1642.870855][T17780] team0: Port device team_slave_1 added [ 1642.959320][T17780] device hsr_slave_0 entered promiscuous mode [ 1643.012583][T17780] device hsr_slave_1 entered promiscuous mode [ 1643.052808][T17780] debugfs: Directory 'hsr0' with parent '/' already present! [ 1643.065221][T17778] bridge0: port 2(bridge_slave_1) entered blocking state [ 1643.072298][T17778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1643.079554][T17778] bridge0: port 1(bridge_slave_0) entered blocking state [ 1643.086658][T17778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1643.105647][T17780] bridge0: port 2(bridge_slave_1) entered blocking state [ 1643.112704][T17780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1643.119960][T17780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1643.127091][T17780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1643.179273][T17778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1643.199144][T12603] bridge0: port 1(bridge_slave_0) entered disabled state [ 1643.206831][T12603] bridge0: port 2(bridge_slave_1) entered disabled state [ 1643.217007][T12603] bridge0: port 1(bridge_slave_0) entered disabled state [ 1643.224729][T12603] bridge0: port 2(bridge_slave_1) entered disabled state [ 1643.239029][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1643.247065][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1643.258921][T17778] 8021q: adding VLAN 0 to HW filter on device team0 [ 1643.272052][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1643.280776][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1643.289283][T12603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1643.296373][T12603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1643.314433][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1643.323151][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1643.331668][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1643.338777][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1643.347128][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1643.356032][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1643.364766][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1643.373218][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1643.387809][T17780] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1643.395007][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1643.408007][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1643.416736][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1643.554487][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1643.565272][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1643.574342][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1643.584639][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1643.597237][T17780] 8021q: adding VLAN 0 to HW filter on device team0 [ 1643.608546][T17778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1643.616471][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1643.625083][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1643.633173][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1643.641656][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1643.650193][T12603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1643.657281][T12603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1643.732661][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1643.741185][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1643.750047][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1643.757191][T10395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1643.765128][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1643.777114][T17778] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1643.791635][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1643.804052][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1643.814276][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1643.890120][T17780] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1643.900783][T17780] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1643.913352][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1643.921331][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1643.930207][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1643.938716][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1643.947272][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1643.955617][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1643.964082][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1643.973312][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1643.991884][T17780] 8021q: adding VLAN 0 to HW filter on device batadv0 12:23:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:30 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:30 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:30 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:30 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1644.359052][T17797] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1644.371146][T17799] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1644.970460][T17815] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:23:31 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:31 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:31 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:31 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:31 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:31 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1645.591731][T17825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 12:23:31 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:32 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1646.144234][T17827] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1646.292096][T17841] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1646.308526][T17852] IPVS: ftp: loaded support on port[0] = 21 [ 1646.324180][T13172] device bridge_slave_1 left promiscuous mode [ 1646.345009][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1646.384945][T13172] device bridge_slave_0 left promiscuous mode [ 1646.391492][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1646.433764][T13172] device bridge_slave_1 left promiscuous mode [ 1646.439931][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1646.492955][T13172] device bridge_slave_0 left promiscuous mode [ 1646.499095][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1647.883610][T13172] device hsr_slave_0 left promiscuous mode [ 1647.932375][T13172] device hsr_slave_1 left promiscuous mode [ 1647.988567][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1647.998725][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1648.009964][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1648.035568][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1648.093615][T13172] bond0 (unregistering): Released all slaves [ 1648.252820][T13172] device hsr_slave_0 left promiscuous mode [ 1648.302399][T13172] device hsr_slave_1 left promiscuous mode [ 1648.357773][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1648.368481][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1648.379204][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1648.425534][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1648.513162][T13172] bond0 (unregistering): Released all slaves [ 1648.600457][T17863] IPVS: ftp: loaded support on port[0] = 21 [ 1648.688343][T17852] chnl_net:caif_netlink_parms(): no params data found [ 1648.758397][T17852] bridge0: port 1(bridge_slave_0) entered blocking state [ 1648.765593][T17852] bridge0: port 1(bridge_slave_0) entered disabled state [ 1648.773532][T17852] device bridge_slave_0 entered promiscuous mode [ 1648.783767][T17852] bridge0: port 2(bridge_slave_1) entered blocking state [ 1648.790856][T17852] bridge0: port 2(bridge_slave_1) entered disabled state [ 1648.798541][T17852] device bridge_slave_1 entered promiscuous mode [ 1648.805901][T17863] chnl_net:caif_netlink_parms(): no params data found [ 1648.834674][T17852] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1648.849350][T17852] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1648.875855][T17863] bridge0: port 1(bridge_slave_0) entered blocking state [ 1648.884999][T17863] bridge0: port 1(bridge_slave_0) entered disabled state [ 1648.892705][T17863] device bridge_slave_0 entered promiscuous mode [ 1648.906223][T17852] team0: Port device team_slave_0 added [ 1648.912712][T17863] bridge0: port 2(bridge_slave_1) entered blocking state [ 1648.919780][T17863] bridge0: port 2(bridge_slave_1) entered disabled state [ 1648.927425][T17863] device bridge_slave_1 entered promiscuous mode [ 1648.946729][T17863] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1648.956955][T17852] team0: Port device team_slave_1 added [ 1648.970479][T17863] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1649.073546][T17863] team0: Port device team_slave_0 added [ 1649.115190][T17852] device hsr_slave_0 entered promiscuous mode [ 1649.245949][T17852] device hsr_slave_1 entered promiscuous mode [ 1649.303716][T17863] team0: Port device team_slave_1 added [ 1649.340194][T17852] bridge0: port 2(bridge_slave_1) entered blocking state [ 1649.347281][T17852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1649.354649][T17852] bridge0: port 1(bridge_slave_0) entered blocking state [ 1649.361712][T17852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1649.415628][T17863] device hsr_slave_0 entered promiscuous mode [ 1649.494560][T17863] device hsr_slave_1 entered promiscuous mode [ 1649.552405][T17863] debugfs: Directory 'hsr0' with parent '/' already present! [ 1649.571776][T17863] bridge0: port 2(bridge_slave_1) entered blocking state [ 1649.578861][T17863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1649.586249][T17863] bridge0: port 1(bridge_slave_0) entered blocking state [ 1649.593330][T17863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1649.655259][T17863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1649.674692][T17852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1649.682809][T12603] bridge0: port 1(bridge_slave_0) entered disabled state [ 1649.697691][T12603] bridge0: port 2(bridge_slave_1) entered disabled state [ 1649.707516][T12603] bridge0: port 1(bridge_slave_0) entered disabled state [ 1649.715656][T12603] bridge0: port 2(bridge_slave_1) entered disabled state [ 1649.738734][T17863] 8021q: adding VLAN 0 to HW filter on device team0 [ 1649.746235][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1649.755774][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1649.769470][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1649.777729][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1649.792444][T17852] 8021q: adding VLAN 0 to HW filter on device team0 [ 1649.813192][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1649.822181][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1649.835912][T12603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1649.843068][T12603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1649.856065][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1649.864939][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1649.874094][T12603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1649.881146][T12603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1649.894120][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1649.903319][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1649.911709][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1649.918845][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1649.926475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1649.942327][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1649.951021][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1649.959921][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1649.968346][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1649.977026][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1649.986132][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1650.000719][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1650.009291][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1650.017726][T10395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1650.024831][T10395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1650.034010][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1650.042403][T10395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1650.062985][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1650.071586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1650.080016][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1650.088852][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1650.097800][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1650.106282][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1650.115034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1650.123669][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1650.131933][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1650.140289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1650.148592][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1650.164234][T17863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1650.176153][T17852] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1650.187374][T17852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1650.197213][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1650.207418][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1650.234927][T17852] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1650.249162][T17863] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1650.396431][T17876] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1650.716751][T17879] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:23:37 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:37 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:37 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:37 executing program 2: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:37 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:37 executing program 2: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:37 executing program 2: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:37 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, 0x0, 0x0) 12:23:37 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, 0x0, 0x0) 12:23:38 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1652.198899][T17890] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1652.208477][T17883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:38 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, 0x0, 0x0) 12:23:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1652.462723][T17939] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1653.133424][T13172] device bridge_slave_1 left promiscuous mode [ 1653.139621][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1653.193668][T13172] device bridge_slave_0 left promiscuous mode [ 1653.199816][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1653.263170][T13172] device bridge_slave_1 left promiscuous mode [ 1653.269945][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1653.316577][T13172] device bridge_slave_0 left promiscuous mode [ 1653.322957][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1654.702976][T13172] device hsr_slave_0 left promiscuous mode [ 1654.762389][T13172] device hsr_slave_1 left promiscuous mode [ 1654.807920][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1654.818805][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1654.829498][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1654.855988][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1654.947274][T13172] bond0 (unregistering): Released all slaves [ 1655.082974][T13172] device hsr_slave_0 left promiscuous mode [ 1655.122458][T13172] device hsr_slave_1 left promiscuous mode [ 1655.168779][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1655.179206][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1655.190349][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1655.245944][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1655.309839][T13172] bond0 (unregistering): Released all slaves [ 1655.419218][T17942] IPVS: ftp: loaded support on port[0] = 21 [ 1655.491863][T17942] chnl_net:caif_netlink_parms(): no params data found [ 1655.522183][T17942] bridge0: port 1(bridge_slave_0) entered blocking state [ 1655.529611][T17942] bridge0: port 1(bridge_slave_0) entered disabled state [ 1655.537272][T17942] device bridge_slave_0 entered promiscuous mode [ 1655.544852][T17942] bridge0: port 2(bridge_slave_1) entered blocking state [ 1655.551946][T17942] bridge0: port 2(bridge_slave_1) entered disabled state [ 1655.559502][T17942] device bridge_slave_1 entered promiscuous mode [ 1655.577687][T17942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1655.588186][T17942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1655.609831][T17942] team0: Port device team_slave_0 added [ 1655.616803][T17942] team0: Port device team_slave_1 added [ 1655.684415][T17942] device hsr_slave_0 entered promiscuous mode [ 1655.723379][T17942] device hsr_slave_1 entered promiscuous mode [ 1655.762347][T17942] debugfs: Directory 'hsr0' with parent '/' already present! [ 1655.778501][T17942] bridge0: port 2(bridge_slave_1) entered blocking state [ 1655.785622][T17942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1655.792973][T17942] bridge0: port 1(bridge_slave_0) entered blocking state [ 1655.800038][T17942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1655.830041][T17942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1655.929158][T17942] 8021q: adding VLAN 0 to HW filter on device team0 [ 1655.936966][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1655.945662][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1655.956628][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1655.981746][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1655.990824][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1655.997926][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1656.010359][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1656.019335][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1656.026420][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1656.047764][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1656.056539][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1656.068795][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1656.081201][T13234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1656.092094][T17942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1656.103714][T17942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1656.112134][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1656.139288][T17942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1656.310334][T17950] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:23:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:42 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:42 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:23:42 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:42 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:42 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1656.696529][T17957] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:42 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:23:42 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1656.773458][T17956] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:23:43 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:43 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:43 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:23:43 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 12:23:43 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:43 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 1657.367580][T17972] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:43 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1657.825256][T18000] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1658.930932][T18003] IPVS: ftp: loaded support on port[0] = 21 [ 1659.073724][T18003] chnl_net:caif_netlink_parms(): no params data found [ 1659.099638][T18003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1659.107081][T18003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1659.114746][T18003] device bridge_slave_0 entered promiscuous mode [ 1659.122347][T18003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1659.129539][T18003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1659.137388][T18003] device bridge_slave_1 entered promiscuous mode [ 1659.236103][T18003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1659.247045][T18003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1659.265092][T18003] team0: Port device team_slave_0 added [ 1659.359704][T18003] team0: Port device team_slave_1 added [ 1659.485254][T18003] device hsr_slave_0 entered promiscuous mode [ 1659.533601][T18003] device hsr_slave_1 entered promiscuous mode [ 1659.574146][T18003] debugfs: Directory 'hsr0' with parent '/' already present! [ 1659.679890][T18003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1659.686993][T18003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1659.694655][T18003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1659.701680][T18003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1659.735850][T18003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1659.834034][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1659.842010][ T881] bridge0: port 1(bridge_slave_0) entered disabled state [ 1659.849619][ T881] bridge0: port 2(bridge_slave_1) entered disabled state [ 1659.857567][ T881] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1659.869462][T18003] 8021q: adding VLAN 0 to HW filter on device team0 [ 1659.880950][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1659.891624][T12603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1659.898709][T12603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1659.913370][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1659.921675][ T1767] bridge0: port 2(bridge_slave_1) entered blocking state [ 1659.928761][ T1767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1659.937525][T13172] device bridge_slave_1 left promiscuous mode [ 1659.944041][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1659.993299][T13172] device bridge_slave_0 left promiscuous mode [ 1659.999442][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1660.053532][T13172] device bridge_slave_1 left promiscuous mode [ 1660.059714][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1660.112924][T13172] device bridge_slave_0 left promiscuous mode [ 1660.119130][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1660.163684][T13172] device bridge_slave_1 left promiscuous mode [ 1660.169891][T13172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1660.212976][T13172] device bridge_slave_0 left promiscuous mode [ 1660.219141][T13172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1662.232795][T13172] device hsr_slave_0 left promiscuous mode [ 1662.272453][T13172] device hsr_slave_1 left promiscuous mode [ 1662.319004][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1662.329536][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1662.340270][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1662.376982][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1662.433965][T13172] bond0 (unregistering): Released all slaves [ 1662.592698][T13172] device hsr_slave_0 left promiscuous mode [ 1662.642348][T13172] device hsr_slave_1 left promiscuous mode [ 1662.689463][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1662.700392][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1662.710077][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1662.756229][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1662.815655][T13172] bond0 (unregistering): Released all slaves [ 1662.982824][T13172] device hsr_slave_0 left promiscuous mode [ 1663.032390][T13172] device hsr_slave_1 left promiscuous mode [ 1663.078866][T13172] team0 (unregistering): Port device team_slave_1 removed [ 1663.088542][T13172] team0 (unregistering): Port device team_slave_0 removed [ 1663.098338][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1663.136432][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1663.205191][T13172] bond0 (unregistering): Released all slaves [ 1663.368026][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1663.376840][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1663.385317][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1663.394419][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1663.402717][T12762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1663.418032][T18003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1663.435835][T18003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1663.560696][T18012] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:23:49 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:49 executing program 4: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:49 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 12:23:49 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:49 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:49 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:49 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 1663.827794][T18017] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1663.906972][T18022] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:23:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:50 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:50 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 1664.120872][T18032] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1664.238642][T18041] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:23:50 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 12:23:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:50 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1664.441296][T18049] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:23:50 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1664.535132][T18055] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1664.684108][T18069] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1665.957758][T18074] IPVS: ftp: loaded support on port[0] = 21 [ 1666.016053][T18074] chnl_net:caif_netlink_parms(): no params data found [ 1666.042300][T18074] bridge0: port 1(bridge_slave_0) entered blocking state [ 1666.049369][T18074] bridge0: port 1(bridge_slave_0) entered disabled state [ 1666.057009][T18074] device bridge_slave_0 entered promiscuous mode [ 1666.064622][T18074] bridge0: port 2(bridge_slave_1) entered blocking state [ 1666.071700][T18074] bridge0: port 2(bridge_slave_1) entered disabled state [ 1666.079495][T18074] device bridge_slave_1 entered promiscuous mode [ 1666.095753][T18074] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1666.106081][T18074] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1666.123202][T18074] team0: Port device team_slave_0 added [ 1666.129929][T18074] team0: Port device team_slave_1 added [ 1666.213895][T18074] device hsr_slave_0 entered promiscuous mode [ 1666.252499][T18074] device hsr_slave_1 entered promiscuous mode [ 1666.299358][T18074] bridge0: port 2(bridge_slave_1) entered blocking state [ 1666.306470][T18074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1666.313852][T18074] bridge0: port 1(bridge_slave_0) entered blocking state [ 1666.320963][T18074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1666.358071][T18074] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1666.370662][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1666.379211][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1666.387310][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1666.395548][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1666.407965][T18074] 8021q: adding VLAN 0 to HW filter on device team0 [ 1666.420202][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1666.428941][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1666.436035][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1666.455213][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1666.463874][T12603] bridge0: port 2(bridge_slave_1) entered blocking state [ 1666.470937][T12603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1666.479421][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1666.487877][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1666.496320][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1666.504862][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1666.516907][T12603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1666.526764][T18074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1666.539445][T18077] IPVS: ftp: loaded support on port[0] = 21 [ 1666.545785][T18074] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1666.659827][T18077] chnl_net:caif_netlink_parms(): no params data found [ 1666.686203][T18077] bridge0: port 1(bridge_slave_0) entered blocking state [ 1666.693379][T18077] bridge0: port 1(bridge_slave_0) entered disabled state 12:23:52 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1666.704588][T18077] device bridge_slave_0 entered promiscuous mode [ 1666.714106][T18077] bridge0: port 2(bridge_slave_1) entered blocking state [ 1666.721768][T18077] bridge0: port 2(bridge_slave_1) entered disabled state [ 1666.732828][T18077] device bridge_slave_1 entered promiscuous mode [ 1666.758455][T18077] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1666.770576][T18077] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1666.789915][T18077] team0: Port device team_slave_0 added [ 1666.796909][T18077] team0: Port device team_slave_1 added [ 1666.934386][T18077] device hsr_slave_0 entered promiscuous mode [ 1666.953576][T18077] device hsr_slave_1 entered promiscuous mode [ 1666.992444][T18077] debugfs: Directory 'hsr0' with parent '/' already present! [ 1667.156414][T18077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1667.167943][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1667.175663][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1667.218415][T18077] 8021q: adding VLAN 0 to HW filter on device team0 [ 1667.227707][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1667.236201][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1667.244479][ T1766] bridge0: port 1(bridge_slave_0) entered blocking state [ 1667.251518][ T1766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1667.260412][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1667.269381][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1667.278463][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1667.286989][ T1038] bridge0: port 2(bridge_slave_1) entered blocking state [ 1667.294090][ T1038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1667.311924][T18077] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1667.322857][T18077] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1667.368491][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1667.377217][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1667.387409][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1667.395864][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1667.404658][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1667.413226][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1667.421462][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1667.429974][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1667.438521][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1667.446841][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1667.455438][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1667.463276][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1667.511488][T18077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1667.639753][T18093] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 12:23:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfe) r2 = accept(r1, 0x0, 0x0) dup2(r0, r2) 12:23:53 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)}], 0x1}, 0x0) 12:23:53 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:53 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:53 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:53 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:54 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)}], 0x1}, 0x0) 12:23:54 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1668.022874][T18113] IPVS: ftp: loaded support on port[0] = 21 [ 1668.083499][T18099] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1668.131341][ T26] device bridge_slave_1 left promiscuous mode [ 1668.148149][ T26] bridge0: port 2(bridge_slave_1) entered disabled state 12:23:54 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)}], 0x1}, 0x0) 12:23:54 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:54 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1668.233960][ T26] device bridge_slave_0 left promiscuous mode [ 1668.245079][ T26] bridge0: port 1(bridge_slave_0) entered disabled state 12:23:54 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) [ 1668.791620][T18115] IPVS: ftp: loaded support on port[0] = 21 [ 1669.522714][ T26] device hsr_slave_0 left promiscuous mode [ 1669.572362][ T26] device hsr_slave_1 left promiscuous mode [ 1669.618327][ T26] team0 (unregistering): Port device team_slave_1 removed [ 1669.629032][ T26] team0 (unregistering): Port device team_slave_0 removed [ 1669.640070][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1669.665705][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1669.748247][ T26] bond0 (unregistering): Released all slaves [ 1669.840464][T18134] __nla_validate_parse: 1 callbacks suppressed [ 1669.840473][T18134] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1669.868557][T18138] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1670.000788][T18154] IPVS: ftp: loaded support on port[0] = 21 [ 1670.188359][T18154] chnl_net:caif_netlink_parms(): no params data found [ 1670.277403][T18154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1670.294919][T18154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1670.316116][T18154] device bridge_slave_0 entered promiscuous mode [ 1670.338793][T18154] bridge0: port 2(bridge_slave_1) entered blocking state [ 1670.360939][T18154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1670.382943][T18154] device bridge_slave_1 entered promiscuous mode [ 1670.422845][T18154] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1670.444895][T18154] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1670.495876][T18154] team0: Port device team_slave_0 added [ 1670.505063][T18154] team0: Port device team_slave_1 added [ 1670.584660][T18154] device hsr_slave_0 entered promiscuous mode [ 1670.622445][T18154] device hsr_slave_1 entered promiscuous mode [ 1670.701313][T18154] bridge0: port 2(bridge_slave_1) entered blocking state [ 1670.708446][T18154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1670.715812][T18154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1670.722899][T18154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1670.757289][T18154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1670.770775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1670.796267][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1670.812631][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1670.836793][T18154] 8021q: adding VLAN 0 to HW filter on device team0 [ 1670.846375][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1670.855201][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 12:23:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:57 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e2800", 0x26}], 0x1}, 0x0) 12:23:57 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfe) r2 = accept(r1, 0x0, 0x0) dup2(r0, r2) 12:23:57 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1670.866873][ T1766] bridge0: port 1(bridge_slave_0) entered blocking state [ 1670.873965][ T1766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1670.905220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1670.947880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1670.992969][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1671.000088][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1671.039540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1671.051263][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1671.065490][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1671.094125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1671.107036][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1671.117138][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1671.128927][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1671.140966][T18179] IPVS: ftp: loaded support on port[0] = 21 [ 1671.144767][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1671.159012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1671.167811][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1671.179866][T18154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1671.211605][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1671.228383][T18161] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1671.237953][T18164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1671.280567][T18154] 8021q: adding VLAN 0 to HW filter on device batadv0 12:23:57 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:57 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e2800", 0x26}], 0x1}, 0x0) 12:23:57 executing program 0: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:57 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfe) r2 = accept(r1, 0x0, 0x0) dup2(r0, r2) 12:23:57 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e2800", 0x26}], 0x1}, 0x0) 12:23:57 executing program 0: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1671.589745][T18201] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1671.616398][T18205] IPVS: ftp: loaded support on port[0] = 21 12:23:57 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:57 executing program 0: socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:58 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, 0x0, 0x0) 12:23:58 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:23:58 executing program 3: r0 = socket$inet(0x10, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1671.936941][T18222] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:23:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:58 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:58 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, 0x0, 0x0) 12:23:58 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:23:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) unshare(0x40000000) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0xfe) r2 = accept(r1, 0x0, 0x0) dup2(r0, r2) 12:23:58 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1672.238526][T18237] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:23:58 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 12:23:58 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, 0x0, 0x0) 12:23:58 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1672.496442][T18256] IPVS: ftp: loaded support on port[0] = 21 12:23:58 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 12:23:58 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:23:59 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 12:23:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2003, 0x0) 12:23:59 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 12:23:59 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:23:59 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 1673.287181][T18244] ================================================================== [ 1673.295290][T18244] BUG: KASAN: use-after-free in do_raw_spin_lock+0x28a/0x2e0 [ 1673.302657][T18244] Read of size 4 at addr ffff88808f0a490c by task syz-executor.5/18244 [ 1673.310911][T18244] [ 1673.313255][T18244] CPU: 0 PID: 18244 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #96 [ 1673.321219][T18244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1673.331262][T18244] Call Trace: [ 1673.334556][T18244] dump_stack+0x172/0x1f0 [ 1673.338886][T18244] ? do_raw_spin_lock+0x28a/0x2e0 [ 1673.343909][T18244] print_address_description.cold+0xd4/0x306 [ 1673.349887][T18244] ? do_raw_spin_lock+0x28a/0x2e0 [ 1673.354926][T18244] ? do_raw_spin_lock+0x28a/0x2e0 [ 1673.359981][T18244] __kasan_report.cold+0x1b/0x36 [ 1673.364942][T18244] ? do_raw_spin_lock+0x28a/0x2e0 [ 1673.369975][T18244] kasan_report+0x12/0x17 [ 1673.374309][T18244] __asan_report_load4_noabort+0x14/0x20 [ 1673.379951][T18244] do_raw_spin_lock+0x28a/0x2e0 [ 1673.384798][T18244] ? rwlock_bug.part.0+0x90/0x90 [ 1673.390870][T18244] ? lock_acquire+0x190/0x410 [ 1673.395571][T18244] ? release_sock+0x20/0x1c0 [ 1673.400192][T18244] ? __sk_free+0x100/0x360 [ 1673.404612][T18244] _raw_spin_lock_bh+0x3b/0x50 [ 1673.409401][T18244] ? release_sock+0x20/0x1c0 [ 1673.414013][T18244] release_sock+0x20/0x1c0 [ 1673.418474][T18244] nr_release+0x303/0x3e0 [ 1673.422808][T18244] __sock_release+0xce/0x280 [ 1673.427399][T18244] sock_close+0x1e/0x30 [ 1673.431553][T18244] __fput+0x2ff/0x890 [ 1673.435540][T18244] ? __sock_release+0x280/0x280 [ 1673.440415][T18244] ____fput+0x16/0x20 [ 1673.444398][T18244] task_work_run+0x145/0x1c0 [ 1673.448994][T18244] exit_to_usermode_loop+0x316/0x380 [ 1673.454279][T18244] do_syscall_64+0x5a9/0x6a0 [ 1673.458879][T18244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1673.464778][T18244] RIP: 0033:0x413511 [ 1673.468677][T18244] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1673.488283][T18244] RSP: 002b:00007ffee7be2570 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1673.496688][T18244] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 1673.504659][T18244] RDX: 0000000000000000 RSI: ffffffff873ae19a RDI: 0000000000000004 [ 1673.512640][T18244] RBP: 0000000000000001 R08: ffffffff81339e6a R09: 00000000ce0d33b4 [ 1673.520606][T18244] R10: 00007ffee7be2650 R11: 0000000000000293 R12: 000000000075c9a0 [ 1673.528571][T18244] R13: 000000000075c9a0 R14: 00000000007613e0 R15: ffffffffffffffff [ 1673.536553][T18244] ? __phys_addr+0x1a/0x120 [ 1673.541056][T18244] ? xas_find_marked+0xc6a/0xf20 [ 1673.545996][T18244] [ 1673.548333][T18244] Allocated by task 18003: [ 1673.552741][T18244] save_stack+0x23/0x90 [ 1673.556898][T18244] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1673.562535][T18244] kasan_kmalloc+0x9/0x10 [ 1673.566862][T18244] __kmalloc+0x163/0x770 [ 1673.571114][T18244] sk_prot_alloc+0x23a/0x310 [ 1673.575700][T18244] sk_alloc+0x39/0xf70 [ 1673.579761][T18244] nr_rx_frame+0x733/0x1e73 [ 1673.584257][T18244] nr_loopback_timer+0x7b/0x170 [ 1673.589112][T18244] call_timer_fn+0x1ac/0x780 [ 1673.593700][T18244] run_timer_softirq+0x697/0x17a0 [ 1673.598742][T18244] __do_softirq+0x262/0x98c [ 1673.603229][T18244] [ 1673.605548][T18244] Freed by task 18244: [ 1673.609607][T18244] save_stack+0x23/0x90 [ 1673.613758][T18244] __kasan_slab_free+0x102/0x150 [ 1673.618685][T18244] kasan_slab_free+0xe/0x10 [ 1673.623175][T18244] kfree+0x10a/0x2c0 [ 1673.627059][T18244] __sk_destruct+0x4f7/0x6e0 [ 1673.631655][T18244] sk_destruct+0x86/0xa0 [ 1673.635889][T18244] __sk_free+0xfb/0x360 [ 1673.640034][T18244] sk_free+0x42/0x50 [ 1673.643919][T18244] nr_destroy_socket+0x3ea/0x4a0 [ 1673.648846][T18244] nr_release+0x347/0x3e0 [ 1673.653166][T18244] __sock_release+0xce/0x280 [ 1673.658111][T18244] sock_close+0x1e/0x30 [ 1673.662260][T18244] __fput+0x2ff/0x890 [ 1673.666229][T18244] ____fput+0x16/0x20 [ 1673.670200][T18244] task_work_run+0x145/0x1c0 [ 1673.675252][T18244] exit_to_usermode_loop+0x316/0x380 [ 1673.680533][T18244] do_syscall_64+0x5a9/0x6a0 [ 1673.685135][T18244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1673.691012][T18244] [ 1673.693336][T18244] The buggy address belongs to the object at ffff88808f0a4880 [ 1673.693336][T18244] which belongs to the cache kmalloc-2k of size 2048 [ 1673.707379][T18244] The buggy address is located 140 bytes inside of [ 1673.707379][T18244] 2048-byte region [ffff88808f0a4880, ffff88808f0a5080) [ 1673.720722][T18244] The buggy address belongs to the page: [ 1673.726346][T18244] page:ffffea00023c2900 refcount:1 mapcount:0 mapping:ffff8880aa400e00 index:0x0 compound_mapcount: 0 [ 1673.737271][T18244] flags: 0x1fffc0000010200(slab|head) [ 1673.742730][T18244] raw: 01fffc0000010200 ffffea0001747188 ffffea00017f4188 ffff8880aa400e00 [ 1673.751334][T18244] raw: 0000000000000000 ffff88808f0a4000 0000000100000003 0000000000000000 [ 1673.759919][T18244] page dumped because: kasan: bad access detected [ 1673.766331][T18244] [ 1673.768652][T18244] Memory state around the buggy address: [ 1673.774276][T18244] ffff88808f0a4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1673.782344][T18244] ffff88808f0a4880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1673.790397][T18244] >ffff88808f0a4900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1673.798442][T18244] ^ [ 1673.802784][T18244] ffff88808f0a4980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1673.811456][T18244] ffff88808f0a4a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1673.819499][T18244] ================================================================== [ 1673.827640][T18244] Kernel panic - not syncing: panic_on_warn set ... [ 1673.834243][T18244] CPU: 0 PID: 18244 Comm: syz-executor.5 Tainted: G B 5.3.0-rc2+ #96 [ 1673.843595][T18244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1673.853639][T18244] Call Trace: [ 1673.856925][T18244] dump_stack+0x172/0x1f0 [ 1673.861266][T18244] panic+0x2dc/0x755 [ 1673.865171][T18244] ? add_taint.cold+0x16/0x16 [ 1673.869866][T18244] ? trace_hardirqs_on+0x5e/0x240 [ 1673.874886][T18244] ? trace_hardirqs_on+0x5e/0x240 [ 1673.879924][T18244] ? do_raw_spin_lock+0x28a/0x2e0 [ 1673.884958][T18244] end_report+0x47/0x4f [ 1673.889125][T18244] ? do_raw_spin_lock+0x28a/0x2e0 [ 1673.894157][T18244] __kasan_report.cold+0xe/0x36 [ 1673.899016][T18244] ? do_raw_spin_lock+0x28a/0x2e0 [ 1673.904045][T18244] kasan_report+0x12/0x17 [ 1673.908384][T18244] __asan_report_load4_noabort+0x14/0x20 [ 1673.914021][T18244] do_raw_spin_lock+0x28a/0x2e0 [ 1673.916958][ T3907] kobject: 'loop2' (00000000f4dd884b): kobject_uevent_env [ 1673.918879][T18244] ? rwlock_bug.part.0+0x90/0x90 [ 1673.930899][T18244] ? lock_acquire+0x190/0x410 [ 1673.935574][T18244] ? release_sock+0x20/0x1c0 [ 1673.940170][T18244] ? __sk_free+0x100/0x360 [ 1673.940189][ T3907] kobject: 'loop2' (00000000f4dd884b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1673.944586][T18244] _raw_spin_lock_bh+0x3b/0x50 [ 1673.944598][T18244] ? release_sock+0x20/0x1c0 [ 1673.944610][T18244] release_sock+0x20/0x1c0 [ 1673.944625][T18244] nr_release+0x303/0x3e0 [ 1673.944641][T18244] __sock_release+0xce/0x280 [ 1673.944654][T18244] sock_close+0x1e/0x30 [ 1673.944668][T18244] __fput+0x2ff/0x890 [ 1673.944687][T18244] ? __sock_release+0x280/0x280 [ 1673.981186][ T3907] kobject: 'loop4' (000000006e6bb957): kobject_uevent_env [ 1673.981685][T18244] ____fput+0x16/0x20 [ 1673.981707][T18244] task_work_run+0x145/0x1c0 [ 1673.986347][ T3907] kobject: 'loop4' (000000006e6bb957): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1673.990517][T18244] exit_to_usermode_loop+0x316/0x380 [ 1673.990534][T18244] do_syscall_64+0x5a9/0x6a0 [ 1673.990551][T18244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1673.990561][T18244] RIP: 0033:0x413511 [ 1673.990576][T18244] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1673.990590][T18244] RSP: 002b:00007ffee7be2570 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1674.063946][T18244] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 1674.071895][T18244] RDX: 0000000000000000 RSI: ffffffff873ae19a RDI: 0000000000000004 [ 1674.079845][T18244] RBP: 0000000000000001 R08: ffffffff81339e6a R09: 00000000ce0d33b4 [ 1674.087795][T18244] R10: 00007ffee7be2650 R11: 0000000000000293 R12: 000000000075c9a0 [ 1674.095745][T18244] R13: 000000000075c9a0 R14: 00000000007613e0 R15: ffffffffffffffff [ 1674.103712][T18244] ? __phys_addr+0x1a/0x120 [ 1674.108297][T18244] ? xas_find_marked+0xc6a/0xf20 [ 1674.114334][T18244] Kernel Offset: disabled [ 1674.118654][T18244] Rebooting in 86400 seconds..